Friends don't let friends get scammed. Not everyone knows how typical scams unfold, so here are some real-world examples...
Read moreWhy Paper Receipts are Money at the Drive-Thru
June 20 2022Check out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the...
Read moreName That Toon: Cuter Than a June Bug
June 20 2022Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreA Kremlin spokesman said that the St. Petersburg International Economic Forum accreditation and admissions systems were shut down by a DDoS attack.
Read moreLow-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Read moreSecurity Lessons From Protecting Live Events
June 20 2022Security defenders working for large venues and international events need to be able to move at machine speed because they have a limited time to detect and recover from...
Read moreCompanies need to fill some of the 3.5 million empty cybersecurity seats with workers who bring different experiences, perspectives, and cultures to the table. Cut a few doors and...
Read moreLow-code/no-code platforms allow users to embed their existing user identities within an application, increasing the risk of credentials leakage.
Read moreHertzbleed: A New Side-Channel Attack
June 20 2022Hertzbleed is a new side-channel attack that works against a variety of microprocressors. Deducing cryptographic keys by analyzing power consumption has long been an attack, but it’s not generally...
Read moreFrom a restaurant in Singapore. It’s not actually giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I...
Read more
Recent Comments