The Android app unnecessarily accessed clipboard device contents, which often includes passwords and other sensitive data.
Read moreThis is the latest in a line of law-enforcement actions busting up the ransomware scene.
Read moreA team has found that the Crystals-Kyber encryption algorithm is open to side-channel attacks, under certain implementations.
Read moreDevices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.
Read moreAs digital identity verification challenges grow, organizations need to adopt a more advanced and forward-focused approach to preventing hacks.
Read moreName That Edge Toon: Domino Effect
March 6 2023Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreNew National Cybersecurity Strategy
March 6 2023Last week, the Biden administration released a new National Cybersecurity Strategy (summary here). There is lots of good commentary out there....
Read moreThe Rapid7 Cyber Threat Intelligence Laboratory at the University of South Florida will provide data on real-world threats for faculty and students to use in their research.
Read moreResearchers are prototyping multi-segment shapeshifter drones, which are “the precursors to flying squid-bots.” As usual, you can also use this squid post to talk about the security stories in the...
Read more
Recent Comments