How to Make Your Wifi Router as Secure as Possible

Though more router manufacturers are making routers easier to set up and configure—even via handy little apps instead of annoying web-based interfaces—most people probably don’t tweak many options after purchasing a new router…. Source:

Announcing the 1Password command-line tool public beta

Here at AgileBits, we’ve been working hard over the last few months to bring power users, developers, and administrators more powerful ways to interact with 1Password. We’re proud to announce that we have something that fits the bill…. Source:

Going Dark: The Internet Behind The Internet

The average computer user with an Internet connection has access to an amazing wealth of information. But there’s also an entire world that’s invisible to your standard Web browser. These parts of the Internet are known as the Deep Web…. Source:

Malware? In my Docker container? It’s more common than you think

Black Hat Docker containers are the perfect disguise for malware infections, warn researchers. Speaking at the 2017 Black Hat USA conference in Las Vegas, Aqua Security researchers Michael Cherny and Sagie Dulce said [PDF] the Docker API can be abused for remote code execution and security bypass…. Source: