❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Picking a forever email

6 April 2026 at 03:42
TAME YOUR TECH By Susan Bradley Are you still using your original email address and account from your Internet service provider? Is that ISP notifying you that it wants to get out of the email business? Β In years past, you signed with an Internet provider. and as part of that service. they handed you an […]

Moving away from insecure mail

2 March 2026 at 03:42
ON SECURITY By Susan Bradley Tax season provides an opportunity for businesses to do better. Before I get started, note that I’m writing this as an accounting professional in the United States. By their very nature, my observations will be US-centric. But the truth is that the underlying concept is the security of sensitive information, […]

MS-DEFCON 3: I wish we had a level 2.5

27 January 2026 at 03:45
ISSUE 23.04.1 β€’ 2026-01-27 By Susan Bradley The January updates present no issues for some, but lots of issues for others. I’m always hopeful of giving everyone some time every month to apply updates after we’ve vetted them. This month, I can lower the MS-DEFCON level to only 2.5. Unfortunately, we don’t have that, so […]

AI in Gmail?

22 January 2026 at 04:00
Before I tell you how to turn off AI in Gmail – first a word.Β  Anytime you read β€œthis vendor is reading my private emails,” stop. Email is not secure. Not ever. Never was. If you need to hide a private conversation, email is not the thing to use. Now on with the steps: Log […]

Are we ready for changes in tech?

17 November 2025 at 03:45
ISSUE 22.46 β€’ 2025-11-17 ON SECURITY By Susan Bradley Since we first started using technology, we’ve had to deal with change. We’ve gone from a time where having a computer was unusual to a time where having a computer in your pocket is normal. Or nearly normal. Because businesses are facing more and more threats […]

G Suite is the Soft Underbelly of Your Environment

By: BHIS
19 July 2018 at 10:02

Matthew Toussain//* Wouldn’t you like to START your pentests knowing every username for all individuals in your target environment? Gmail, G Suite, Outlook Web Access, Exchange Web Services… Email. A […]

The post G Suite is the Soft Underbelly of Your Environment appeared first on Black Hills Information Security, Inc..

Bypassing Two-Factor Authentication on OWA & Office365 Portals

By: BHIS
2 November 2016 at 11:00

Beau Bullock // Full Disclosure:Β Black Hills Information Security believes in responsible disclosure of vulnerabilities. This vulnerability was reported to Microsoft on September 28th, 2016. As of the publication date of […]

The post Bypassing Two-Factor Authentication on OWA & Office365 Portals appeared first on Black Hills Information Security, Inc..

❌
❌