Useful quantum computers might not actually be possible. But what if they are? And what if they arrive, say, tomorrow?
Read more10 Signs of a Good Security Leader
April 11 2022Strong leadership can lead to motivated and loyal employees. Here's what that looks like.
Read moreDouble-Your-Crypto Scams Share Crypto Scam Host
April 11 2022Online scams that try to separate the unwary from their cryptocurrency are a dime a dozen, but a great many seemingly disparate crypto scam websites tend to rely on...
Read moreIn cybersecurity, user error is the symptom, not the disease. A healthy culture acknowledges and addresses the underlying causes of lapses.
Read moreGoing Passwordless? Here Are 6 Steps to Get Started
April 11 2022High costs and user reluctance have stood in the way of passwordless adoption, but conversion can be simplified if you take it in more gradual steps.
Read moreDe-anonymizing Bitcoin
April 11 2022Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child...
Read moreFriday Squid Blogging: Do Squid Have Emotions?
April 8 2022Scientists are now debating whether octopuses, squid, and crabs have emotions. Short answer: we don’t know, but can’t rule it out.
There may be a point when humans can...
Read more
SharkBot was hidden in apps masquerading as antivirus tools.
Read moreThe operation aimed to disrupt cyber espionage activity a Russian GRU group was using for the Ukraine war.
Read more
Recent Comments