Computer Security Tip of the Day
September 17th
We know at times this whole password thing sounds really complicated. Wouldn't be great if there was a brain dead way you could keep passwords simple and secure at the same time? Well, it's not nearly as hard as you think. Here are three tips to keeping …
Bruce Schneier on Security
September 16th
Not that serious, but interesting: In late 2011, Intel introduced a performance enhancement to its line of server processors that allowed network cards and other peripherals to connect directly to a CPU's last-level cache, rather than following the standa…
September 15th
This is a current list of where and when I am scheduled to speak: I'm speaking at University College London on September 23, 2019. I'm speaking at World's Top 50 Innovators 2019 at the Royal Society in London on September 24, 2019. I'm speaking at Cyber S…
September 14th
In June, I blogged about a video of a live juvenile giant squid. Here's how that video was captured. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here....
September 14th
All of life is based on the coordinated action of genetic parts (genes and their controlling sequences) found in the genomes (the complete DNA sequence) of organisms. Genes and genomes are based on code-- just like the digital language of computers. But i…
September 13th
The Independent Commission on Examination Malpractice in the UK has recommended that all watches be banned from exam rooms, basically because it's becoming very difficult to tell regular watches from smart watches....
Dark Reading Security News
August 28th
You never know what those late-night infomercials are going to turn up.
August 24th
Techniques too tough for quantum computing solutions will be part of public cloud and tape storage encryption.
August 21st
Let's begin by re-evaluating IT infrastructures to determine who has access to what, why, and when.
August 15th
Thousands of organizations, including banks, governments, and the UK Metropolitan Police, use the biometric security tool to authenticate users.
August 10th
The best way to protect your identity in cyberspace is the simplest: Use a variety of strong passwords, and never, ever, use "123456" no matter how easy it is to type.
New Security Threats
September 17th
Julian Assange is among those impacted.
September 17th
Independent researchers found 125 different CVEs across 13 different router and NAS models.
September 17th
Three North Korean threat groups have been sanctioned in the U.S. as part of a larger U.S. initiative against North Korea-linked malicious cyber activity.
September 16th
ReversingLabs identified cybercriminals duping certificate authorities by impersonating legitimate entities and then selling the certificates on the black market.
September 14th
Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.