Linux doesn't BSoD. It has oopses and panics instead. (We show you how to make a kernel module to explore further.)
Read more5 Lessons Learned From Hundreds of Penetration Tests
March 13 2023Developers must balance creativity with security frameworks to keep applications safe. Correlating business logic with security logic will pay in safety dividends.
Read moreAnd the Cyberattack Goes To … Oscar-Nominated Film Fans
March 11 2023With the rise of cybercriminals targeting online piracy, this year's Oscar-nom fans need to be especially careful not to download malicious files while attempting to watch popular films for...
Read moreBetween March 3 and March 9, at least 2,000 people a day downloaded the malicious "Quick access to ChatGPT" Chrome extension from the Google Play app store.
Read moreChinese squid fishing boats are overwhelming Ecuador and Peru. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t...
Read moreA novel take on investment scams mixes romance and the lure of crypto riches to con targets out of "the whole hog" of their assets.
Read moreBlackLotus Secure Boot Bypass Malware Set to Ramp Up
March 11 2023BlackLotus is the first in-the-wild malware to exploit a vulnerability in the Secure Boot process on Windows, and experts expect copycats and imminent increased activity.
Read moreHackers are increasingly tantalized by the troves of sensitive data held by lightly protected law firms and legal services organizations.
Read moreElephant Hackers
March 11 2023An elephant uses its right-of-way privileges to stop sugar-cane trucks and grab food.
Read moreA video-enabled smart intercom made by Chinese company Akuvox has major security vulnerabilities that allow audio and video spying, and the company has so far been unresponsive to the...
Read more
Recent Comments