Computer Security Tip of the Day
May 24th
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.
Bruce Schneier on Security
May 25th
Article: "How a Squid's Color-Changing Skin Inspired a New Material That Can Trap or Release Heat." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines…
May 25th
Recently I've heard Edward Snowden talk about his working at the NSA in Hawaii as being "under a pineapple field." CBS News recently ran a segment on that NSA listening post on Oahu. Not a whole lot of actual information. "We're in office b…
May 24th
Der Spiegel is reporting that the German Ministry for Internal Affairs is planning to require all Internet message services to provide plaintext messages on demand, basically outlawing strong end-to-end encryption. Anyone not complying will be blocked, al…
May 24th
A German auction house is selling an SG-41. It looks beautiful. Starting price is 75,000 euros. My guess is that it will sell for around 100K euros....
May 24th
Summary: Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module. First commercially introduced in 2013, Cisco Trust Anchor module (TAm) is a proprietary hardware security module used in a wide range of Cisco products,…
Dark Reading Security News
May 16th
Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.
May 14th
Yet 68% agree they also must do more to protect their own information.
May 8th
Criminals have begun to recognize that enterprise ransomware offers tremendous financial advantage over the more traditional tactics of wire fraud and account takeover.
May 3rd
Calls to eliminate the password abound on this World Password Day - and the technology to change is ready. So why can't we get off our password habit?
May 3rd
Despite decades trying to fortify our passwords with bolt-on solutions, attackers have always found ways to defeat them. Here are four reasons why.
New Security Threats
May 25th
After a report found that Snap employees were abusing their access to Snapchat data, experts are warning that insider threats will continue to be a top challenge for privacy.
May 25th
New .htaccess injector threat on Joomla and WordPress websites redirects to malicious websites.
May 25th
The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications.
May 24th
The Threatpost team breaks down the top privacy-related data incidents of the week - including data leaks from HCL and a golfing app - and highlights some surprisingly good privacy news.
May 24th
As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.