USB charging stations - can you trust them? What are the real risks, and how can you keep your data safe on the road?
Read moreTop 5 Data Security RSAC 2023 Sessions to Attend
April 17 2023A little preconference reconnoitering of upcoming seminars, keynotes, and track sessions makes plotting your days easier. Here's one attendee's list.
Read moreBusinesses must leverage state and local guidance — along with technology — to maintain secure, compliant infrastructure.
Read moreSwatting as a Service
April 17 2023Motherboard is reporting on AI-generated voices being used for “swatting”:
In fact, Motherboard has found, this synthesized call and another against Hempstead High School were just one small part...
Read more
Friday Squid Blogging: Colossal Squid
April 15 2023Interesting article on the colossal squid, which is larger than the giant squid.
The article answers a vexing question:
So why do we always hear about the giant squid and...
Read more
The threat group behind the SolarWinds supply-chain attacks is back with new tools for spying on officials in NATO countries and Africa.
Read moreWhy is ‘Juice Jacking’ Suddenly Back in the News?
April 15 2023KrebsOnSecurity received a nice bump in traffic this week thanks to tweets from the Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) about "juice jacking," a...
Read moreUpcoming Speaking Engagements
April 15 2023This is a current list of where and when I am scheduled to speak: I’m speaking on “Cybersecurity Thinking to Reinvent Democracy” at RSA Conference 2023 in San Francisco, California,...
Read moreDetailing how extended IoT (xIoT) devices can be used at scale by attackers to establish persistence across networks and what enterprises should start doing about the risk.
Read moreSoftware-Dependency Data Delivers Security to Developers
April 15 2023Google has opened up its software-dependency database, adding to the security data available to developers and tool makers. Now developers need to use it.
Read more
Recent Comments