What are you looking for?

TQA Weekly Show Notes for Season 12

How Vulnerable Is Two-Factor Authentication?
How Technology And End Users Render 2FA Weak

Learn why you as an End User and Technology render 2FA weaker by favoring convenience over security

Read more

Your Operating System Cannot Tell A Human or Robot Apart
Not every keyboard, is actually a keyboard

Learn how the HID poses a security risk to all operating systems.

Read more

Eco-Friendly Computer After-Life
Functioning Computer Being Replaced, What Can I Do With It?

Learn about the many ways you can repurpose your old computer instead of putting it into the trash.

Read more