Techniques used in cyber warfare can be sold to anyone — irrespective of borders, authorities, or affiliations. We need to develop strategies to respond at scale.
Read moreGoogle Is Not Deleting Old YouTube Videos
May 22 2023Google has backtracked on its plan to delete inactive YouTube videos—at least for now. Of course, it could change its mind anytime it wants. It would be nice if this...
Read moreA Peruvian oversight law has the opposite effect:
Peru in 2020 began requiring any foreign fishing boat entering its ports to use a vessel monitoring system allowing its activities...
Read more
In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.
Read moreIt's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.
Read moreThe data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.
Read moreKeep Your Friends Close and Your Identity Closer
May 19 2023As we share an increasing amount of personal information online, we create more opportunities for threat actors to steal our identities.
Read moreNew rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.
Read moreSecurity Risks of New .zip and .mov Domains
May 19 2023Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability.
Read more
Recent Comments