Meet ‘Egregor,’ a New Ransomware Family to Watch
October 5 2020Egregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment.
Read moreEgregor's operators promise to decrypt victims' files and provide security recommendations in exchange for ransom payment.
Read moreCritical Android vulnerability CVE-2019-2234 could enable attackers to take control of a victim's camera and take photos, record videos, and learn location.
Read moreA new initiative will run throughout the month of October, invites the general public to play cybersecurity games (and win fabulous prizes).
Read more
Interesting usability study: “More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication“:
Abstract: Risk-based Authentication (RBA) is an adaptive security measure to strengthen...
Read more
Naked Security Live - here's the recorded version of our latest video. Enjoy.
Read moreThe battle's just beginning as bad actors glean more personal information from victims and use that data to launch larger attacks.
Read moreLast week, we said that "Friends don't let friends get scammed." They don't let themselves get scammed, either!
Read moreAt Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.
Read moreReview of a squid-related children’s book. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreAn IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.
Read more
Recent Comments