Computer Security Tip of the Day
February 21st
What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts?…
Bruce Schneier on Security
February 22nd
It's probably a juvenile: Researchers aboard the New Zealand-based National Institute of Water and Atmospheric Research Ltd (NIWA) research vessel Tangaroa were on an expedition to survey hoki, New Zealand's most valuable commercial fish, in the Chatham R…
February 22nd
For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe how large companies have become central control points for our data. And for maybe half a deca…
February 21st
Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption. Matt Blaze and Ron Rivest were with me; I don't remember who else. We met with then Massac…
February 21st
There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...
February 18th
This hack was possible because the McDonald's app didn't authenticate the server, and just did whatever the server told it to do: McDonald's receipts in Germany end with a link to a survey page. Once you take the survey, you receive a coupon code for a fr…
Dark Reading Security News
February 20th
Researchers spot gaps in users' and IT practitioners' security habits, and between security tools and user preferences.
February 18th
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
February 5th
Almost three-quarters of enterprises plan to have a zero-trust access model by the end of the year, but nearly half of cybersecurity professionals lack the knowledge to implement the right technologies, experts say.
February 4th
While device-aware two-factor authentication is no panacea, it is more secure than conventional SMS-based 2FA. Here's why.
January 30th
While the California Consumer Privacy Act will force companies to provide a modicum of meaningful privacy, World Privacy Day still mainly celebrates data security.
New Security Threats
February 22nd
A new lawsuit alleges that Google’s G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.
February 22nd
When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.
February 22nd
From data privacy to industrial IoT cybersecurity concerns, Threatpost editors discuss the top stories they expect to see at this year's RSA Conference, which kicks off next week in San Francisco.
February 22nd
Scammers are posing as event organizers in a sophisticated fraud effort.
February 21st
The incident cut off access to e-mail and shared IT services across customer sites of the multinational Denmark-based facility-management firm.