How social media scammers buy time to steal your 2FA codes
November 22 2022The warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreThe warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreThe warning is hosted on a real Facebook page; the phishing uses HTTPS via a real Google server... but the content is all fake
Read moreDon't let a keen eye for bargains lead you into risky online behaviour...
Read moreHere in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of...
Read morePatches, busts, leaks and why even low-likelihood exploits can be high-severity risks - listen now!
Read moreIn all the excitement, we kind of lost track ourselves. Were there six 0-days, or only four?
Read moreThis technique measures device response time to determine distance:
The scientists tested the exploit by modifying an off-the-shelf drone to create a flying scanning device, the Wi-Peep. The robotic...
Read more
Never make your users cry/By how you use an API
Read moreThat was the week that was...
Read moreListen now - latest episode - audio plus full transcript
Read more
Recent Comments