More than 25 critical memory allocation bugs could enable attackers to bypass security controls in industrial, medical, and enterprise devices.
Read moreYour Digital Identity’s Evil Shadow
April 29 2021In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.
Read moreThe Challenge of Securing Non-People Identities
April 29 2021Non-people identities, which can act intelligently and make decisions on behalf of a person's identity, are a growing cybersecurity risk.
Read moreTask Force Seeks to Disrupt Ransomware Payments
April 29 2021Some of the world's top tech firms are backing a new industry task force focused on disrupting cybercriminal ransomware gangs by limiting their ability to get paid, and targeting...
Read moreListen now - latest episode - lots of fun but with a serious (and educational!) side.
Read moreIdentifying People Through Lack of Cell Phone Use
April 29 2021In this entertaining story of French serial criminal Rédoine Faïd and his jailbreaking ways, there’s this bit about cell phone surveillance: After Faïd’s helicopter breakout, 3,000 police officers took part...
Read moreAdobe Open Sources Tool for Anomaly Research
April 29 2021The One-Stop Anomaly Shop (OSAS) project packages machine-learning algorithms into a Docker container for finding anomalies in security log data.
Read moreExperian API Exposed Credit Scores of Most Americans
April 28 2021Big-three consumer credit bureau Experian just fixed a weakness with a partner website that let anyone look up the credit score of tens of millions of Americans just by...
Read moreFluBot Malware’s Rapid Spread May Soon Hit US Phones
April 28 2021The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.
Read moreFinancial losses have also increased among organizations in the last year, with the average cost reaching $720,000.
Read more
Recent Comments