Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.
Read moreBrute-Forcing a Fingerprint Reader
May 30 2023It’s neither hard nor expensive:
Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint authentication determines a match using...
Read more
New report provides actionable intelligence about attacks, threat actors, and campaigns.
Read moreNew report provides actionable intelligence about attacks, threat actors, and campaigns.
Read moreFriday Squid Blogging: Online Cephalopod Course
May 27 2023Atlas Obscura has a five-part online course on cephalopods, taught by squid biologist Dr. Sarah McAnulty. As usual, you can also use this squid post to talk about the security...
Read moreImproving the security of open source repositories and keeping malicious components out requires a combination of technology and people.
Read moreInformants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.
Read morePhishing campaigns targeting travelers have evolved from simple, easy-to-spot fraud attempts to highly sophisticated operations.
Read morePhishing Domains Tanked After Meta Sued Freenom
May 27 2023The number of phishing websites tied to domain name registrar Freenom dropped precipitously in the months surrounding a recent lawsuit from social networking giant Meta, which alleged the free...
Read more
Recent Comments