December’s Reimagining Democracy Workshop
August 23 2023Imagine that we’ve all—all of us, all of society—landed on some alien planet, and we have to form a government: clean slate. We don’t have any legacy systems from...
Read moreImagine that we’ve all—all of us, all of society—landed on some alien planet, and we have to form a government: clean slate. We don’t have any legacy systems from...
Read moreSpin.AI's risk assessment of some 300,000 browser extensions had overly permissive access and could execute potentially malicious behaviors.
Read moreThe vulnerability was being exploited in the wild, targeting two versions of Adobe ColdFusion.
Read moreThe increase in cyberattacks against the Middle East in the last few years has pressured Jordan and other nations to better secure their infrastructures.
Read moreMalware aimed at macOS is no longer just a knockoff of a Windows bug, as a new infostealer proliferating on Mac laptops demonstrates.
Read moreCryptography isn't just about secrecy. You need to take care of authenticity (no imposters!) and integrity (no tampering!) as well.
Read moreMakers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees.
Read more
Recent Comments