Do you keep holiday photos away from social media when you’re on vacation? Security pros advise that it's one way to reduce your security risk. Yes, the idea of an attacker mapping out a route to steal items from your home sound ambitious. However, we’ve seen actual examples of a phishing attack as well as theft occur.


Alternatively, the panelists point out that this perspective depends on how vulnerable you might be. If attackers need an entry and believe that you’re a worthy target is vastly different from the general noise of regular social media sharers.


Other articles discussed:

Pseudo ransomware increases
Companies improve their security because of rise in ransomware
Seven things startups need to know
Biometrics: What’s in a face
What happens when you reply to spam, a TED Talk
$500,000 for a zero day?

Tool of the week: https://github.com/wangyu-/udp2raw-tunnel

Panelists: Cindy Ng, Mike Thompson, Forrest Temple, Mike Buckbee