Tom Henderson

Tom Henderson is dojo of ExtremeLabs, researcher at Network World, world traveler, and friend to many.

Intel sold you out

Net neutrality is net new revenue

Net neutrality is net new revenue

Rolling back net neutrality rules will spawn record shareholder returns and telco empires—and destroy the original concept of the internet.

Security certificates gone wrong

Security certificates gone wrong

Some websites, including one secured by the U.S. Department of Homeland Security, fail in their use of security certificates.

Virtual assistants hear everything, so watch what you say. I’m not kidding

Virtual assistants hear everything, so watch what you say. I’m not kidding

Virtual assistants such as Google Home and Amazon Echo lack security guards, raising questions about safety and privacy.

The IoT of bricks: Someone is bricking insecure IoT devices

The IoT of bricks: Someone is bricking insecure IoT devices

BrickerBot takes IoT security into its own hands. It finds vulnerable IoT devices and disables them, creating potentially dangerous situations.

Linux Mint 18.1: Mostly smooth, but some sharp edges
Clear Choice Tests

Linux Mint 18.1: Mostly smooth, but some sharp edges

A review of the latest version of Ubuntu-based operating system offers long-term support.

10 practical privacy tips for the post-privacy internet

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your personal data thanks to the U.S. Congress. Here’s what you can do to maintain your online privacy.

The insecurities list: 10 ways to improve cybersecurity

The insecurities list: 10 ways to improve cybersecurity

Cybersecurity threats are more prevalent than ever. But there are some basic things you can do to protect your company and your users.

Review: VMware vSphere gets much-needed facelift
Clear Choice Tests

Review: VMware vSphere gets much-needed facelift

vSphere 6.5 is easy to install, sports a new VM management console and takes a stab at Docker integration.

Pwn2Own 2017: Your stuff as mincemeat

Pwn2Own 2017: Your stuff as mincemeat

Security teams gathered at Pwn2Own 2017 to hack your favorite software and found plenty of bugs, proving nothing is foolproof.

After the WikiLeaks dump: Do nothing

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Checklist for choosing a small cloud host or ISP

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

Load More