In re-evaluating supply chains, companies should classify vendors with super admin privileges to devices or backdoors as a significant threat.
Read moreWeLeakInfo Leaked Customer Payment Info
March 15 2021A little over a year ago, the FBI and law enforcement partners overseas seized WeLeakInfo[.]com, a wildly popular service that sold access to more than 12 billion usernames and...
Read moreSecurity Analysis of Apple’s “Find My…” Protocol
March 15 2021
Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“:
Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest...
Read more
Naked Security Live – HAFNIUM explained in plain English
March 15 2021Latest episode - watch now!
Read moreUpcoming Speaking Engagements
March 14 2021This is a current list of where and when I am scheduled to speak: I’m speaking at the Australian Cyber Conference 2021 on March 17 and 18, 2021. I’m keynoting the...
Read moreFriday Squid Blogging: On SQUIDS
March 12 2021
A good tutorial:
But we can go beyond the polarization of electrons and really leverage the electron waviness. By interleaving thin layers of superconducting and normal materials, we can...
Read more
Experts share their guidance for organizations running on-premise Exchange servers in the wake of rapidly spreading attacks.
Read moreContemplating the Coffee Supply Chain: A Horror Story
March 12 2021On the bean-to-cup journey, dangers await around every corner. Here, well-caffeinated security experts warn the coffee industry about the threats.
Read moreCan a Programming Language Reduce Vulnerabilities?
March 12 2021Rust offers a safer programming language, but adoption is still a problem despite recent signs of increasing popularity.
Read moreAttackers have begun to deploy ransomware on Microsoft Exchange Servers compromised by the ProxyLogon exploits.
Read more
Recent Comments