The Dangers of Default Cloud Configurations
January 16 2023Default settings can leave blind spots but avoiding this issue can be done.
Read moreDefault settings can leave blind spots but avoiding this issue can be done.
Read moreAbout three-quarters of Java and .NET applications have vulnerabilities from the OWASP Top 10 list, while only 55% of JavaScript codebases have such flaws, according to testing data.
Read moreCellebrite is an cyberweapons arms manufacturer that sells smartphone forensic software to governments around the world. MSAB is a Swedish company that does the same thing. Someone has released...
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking at Capricon, a four-day science fiction convention in Chicago. My talk is on “The...
Read moreBooklist reviews A Hacker’s Mind:
Author and public-interest security technologist Schneier (Data and Goliath, 2015) defines a “hack” as an activity allowed by a system “that subverts the rules...
Read more
Analyzing and learning from incidents is the ideal path to finding more insightful data and metrics, according to the VOID report.
Read moreGood advice on buying squid. I like to buy whole fresh squid and clean it myself. As usual, you can also use this squid post to talk about the security...
Read morePassword manager accounts may have, ironically, been compromised via simple credential stuffing, thanks to password reuse.
Read moreThe bargain T95 Android TV device was delivered with preinstalled malware, adding to a trend of Droid devices coming out-of-the-box tainted.
Read moreRhadamanthys spreads through Google Ads that redirect to bogus download sites for popular workforce software — as well as through more typical malicious emails.
Read more
Recent Comments