Some sites, including Facebook, add parameters to the web address for tracking purposes. These parameters have no functionality that is relevant to the user, but sites rely on...
Read moreHow a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.
Read moreFriday Squid Blogging: Squid Inks Fisherman
July 15 2022Short video. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreWhy 8kun Went Offline During the January 6 Hearings
July 15 2022The latest Jan. 6 committee hearing on Tuesday examined the role of conspiracy theory communities like 8kun[.]top and TheDonald[.]win in helping to organize and galvanize supporters who responded to...
Read moreIT asset tracker and auditor software has a critical issue with insecure object deserialization that could allow threat actors to execute code, researchers say.
Read moreAs more employees plan on taking longer holidays and working remotely from the destination for part of that time, organizations have to consider the risks. Like Wi-Fi networks.
Read moreDevelopers need to be cautious about whom they trust on GitHub because it's easy to establish fake credibility on the platform, security vendor warns.
Read moreJoshua Schulte has been convicted for his role in the Vault 7 Wikileaks data dump that exposed invasive US cyber intelligence tactics.
Read more7 cybersecurity tips for your summer vacation!
July 15 2022Here you go - seven thoughtful cybersecurity tips to help you travel safely...
Read moreResearchers who helped thwart the Russian nation-state group's recent attack on Ukraine's power supply will disclose at Black Hat USA what they found while reverse-engineering the powerful Industroyer2 malware...
Read more
Recent Comments