Cyber-researchers are testing the bounds of optical attacks with a technique that allows attackers to recover voice audio from meetings if there are shiny, lightweight objects nearby.
Read moreFriday Squid Blogging: Squidmobile
May 13 2022The Squidmobile. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreThe Budapest Convention is a multinational coalition that agrees to share electronic evidence across international jurisdictions to track down cybercriminals.
Read moreIn a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness –...
Read moreThe conference opens with stark outlook on the future of global democracy — currently squeezed between Silicon Valley and China.
Read moreThe White House and tech industry pledge $150 million over two years to boost open source resiliency and supply chain security.
Read moreCrooks don't need a password for every user on your network to break in and wreak havoc. One could be enough...
Read moreA brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.
Read moreA brand-new attack vector lays open enterprise data lakes, threatening grave consequences for AI use cases like telesurgery or autonomous cars.
Read moreThree RSA 2022 sessions take deep dives into the security considerations around data cloud transformation.
Read more
Recent Comments