New Book: A Hacker’s Mind
November 12 2022I have a new book coming out in February. It’s about hacking.
A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about...
Read moreI have a new book coming out in February. It’s about hacking.
A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about...
Read morePretty much every aspect of the effort to create easy-to-understand labels for Internet-of-Things (IoT) products is up in the air, according to participants in the process.
Read moreMultifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.
Read moreThe bug affects several Aiphone GT models using NFC technology and allows malicious actors to potentially gain access to sensitive facilities.
Read moreChinese government employs spyware to detect so-called "pre-crimes" including using a VPN, religious apps, or WhatsApp, new analysis reveals.
Read moreA bit like leaving the front door keys under the doormat...
Read moreWith only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.
Read moreHere in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of...
Read moreOkta Worforce Identity Cloud has all three identity functions -- identity access management, identity governance, and privilege access management -- under the hood.
Read moreThe line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.
Read more
Recent Comments