Computer Security Tip of the Day
Oops, it looks like you've entered an invalid feed address!
Bruce Schneier on Security
May 26th
Yet another adversarial ML attack: Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training data are fed into the model in random order. S…
May 24th
Following a recent Supreme Court ruling, the Justice Department will no longer prosecute “good faith” security researchers with cybercrimes: The policy for the first time directs that good-faith security research should not be charged. Good fa…
May 23rd
The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with Base64 encoding. A 4-digit application PIN (which gets set during the ini…
May 21st
Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
May 21st
“Google Maps Adds Shortcuts through Houses of People Google Knows Aren’t Home Right Now.” Excellent satire.
Dark Reading Security News
May 26th
New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
May 26th
Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
May 26th
A sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
May 26th
Open source software community initiative utilizes blockchain technology.
May 26th
Experience Centre features emerging Mastercard products and solutions for securing digital payments on a global scale, including those developed locally in Vancouver.
New Security Threats
May 25th
A slip-up by a malware author has allowed researchers to taxonomize three ransomware variations going by different names.
May 25th
The Google Project Zero researcher found a bug in XML parsing on the Zoom client and server.
May 25th
2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and how organizations and their employees are the reasons why incidents occur.
May 24th
Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.
May 23rd
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.