How a gaming mouse can get you Windows superpowers!
August 24 2021When a helpful feature (that you probably didn't need) turns into an exploitable vulnerability...
Read moreWhen a helpful feature (that you probably didn't need) turns into an exploitable vulnerability...
Read moreThat's funny. I could have sworn I didn't run a print job yesterday... but will you look at that?
Read moreInteresting National Geographic article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreAnother week, another cryptocurrency catastrophe. This time, it's "only" $100 million's worth...
Read more
In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here.
Apple says that hash collisions in its...
Read moreCriminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and...
Read moreLastest episode - listen, laugh and learn! This week, Chester Wisniewski joins us on the show.
Read more
It’s a big one:
As first reported by Motherboard on Sunday, someone on the dark web claims to have obtained the data of 100 million from T-Mobile’s servers...
Read more
Apple’s NeuralHash algorithm — the one it’s using for client-side scanning on the iPhone — has been reverse-engineered.
Turns out it was already in iOS 14.3, and...
Read moreT-Mobile warned Monday that a data breach has exposed the names, date of birth, Social Security number and driver's license/ID information of more than 40 million current, former or...
Read more
Recent Comments