Computer Security Tip of the Day
November 25th
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.
Bruce Schneier on Security
November 25th
In a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates to medicine.
November 24th
Wired has a detailed story about the ransomware attack on a Dusseldorf hospital, the one that resulted in an ambulance being redirected to a more distant hospital and the patient dying. The police wanted to prosecute the ransomware attackers for negligent…
November 23rd
Last week I signed on to two joint letters about the security of the 2020 election. The first was as one of 59 election security experts, basically saying that while the election seems to have been both secure and accurate (voter suppression notwithstandi…
November 23rd
Quanta magazine recently published a breathless article on indistinguishability obfuscation — calling it the “‘crown jewel’ of cryptography” — and saying that it had finally been achieved, based on a recently published …
November 21st
This is the first video footage of a ram’s horn squid (Spirula spirula) . As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Dark Reading Security News
November 25th
Changes are coming to the privacy landscape, including more regulations and technologies.
November 12th
When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.
November 12th
Using a series of processes, infosec pros can then tap automated data hygiene to find and fix files that attackers key in on.
November 11th
A new report reveals organizations are increasing their adoption of biometric authentication and disallowing SMS as a login method.
October 27th
Typically, blocklists are used to prevent users from picking easily guessable patterns, but a small neural network can do the same job and suggests that complex password requirements are not necessary.
New Security Threats
November 26th
Some 50,000 targeted victims have been identified so far in a massive, global scam enterprise that involves 26 different malwares.
November 26th
Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others.
November 26th
Reducing the risks of remote work starts with updating the access policies of yesterday.
November 26th
The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investigate why MEMS microphones respond to sound.
November 25th
Events application Peatix this week disclosed a data breach, after user account information reportedly began circulating on Instagram and Telegram.