Got a PS4? Like to hack?
Read moreThe Unintended Harms of Cybersecurity
June 26 2020Interesting research: "Identifying Unintended Harms of Cybersecurity Countermeasures": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In some...
Read moreREvil gang threaten to auction celebrity data from Mariah Carey, Lebron James, MTV and more
June 26 2020The ransomware gang is threatening to auction celebrities' legal documents stolen from the law firm it paralyzed in May.
Read moreThe U.S. Justice Department today criminally charged a Canadian and a Northern Ireland man for allegedly conspiring to build multiple botnets that enslaved hundreds of thousands of routers and...
Read moreResearchers from IntSights observed a sharp increase in the use of popular instant messaging apps over the past year among threat groups.
Read more7 Tips for Effective Deception
June 25 2020The right decoys can frustrate attackers and help detect threats more quickly.
Read moreHow epidemiology can solve the people problem in security.
Read moreEven as more code is produced, indirect dependencies continue to undermine security.
Read moreMalicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.
Read moreBetter Collaboration Between Security & Development
June 25 2020Security and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline.
Read more
Recent Comments