Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.
Read moreTwelve-Year-Old Linux Vulnerability Discovered and Patched
January 31 2022It’s a privilege escalation vulnerability:
Linux users on Tuesday got a major dose of bad news — a 12-year-old vulnerability in a system tool called Polkit gives attackers unfettered...
Read more
Fake Investor John Bernard Sinks Norwegian Green Shipping Dreams
January 29 2022Several articles here have delved into the history of John Bernard, the pseudonym used by a fake billionaire technology investor who's tricked dozens of start-ups into giving him tens...
Read moreFree home PCR devices would be technological marvels, and really useful, too. But there aren't any...
Read moreFriday Squid Blogging: Cephalopods Thirty Million Years Older Than Previously Thought
January 28 2022New fossils from Newfoundland push the origins of cephalopods to 522 million years ago. As usual, you can also use this squid post to talk about the security stories in...
Read moreEnergy Sector Still Needs to Shut the Barn Door
January 28 2022One third of the companies studied haven't fixed their credential management — the same issue that led to the Colonial Pipeline hack last May.
Read moreThe next big threat to corporate security may not be a new strain of malware or innovative attacker tactics, techniques, and processes. It may be our own mental health.
Read moreHappy Data Privacy Day – and we really do mean “happy” :-)
January 28 2022We give you some simple digital lifesytle tips that cost nothing.
Read moreMore Security Flaws Found in Apple’s OS Technologies
January 28 2022Apple's updates this week included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.
Read moreNavigating Nobelium: Lessons From Cloud Hopper & NotPetya
January 28 2022Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.
Read more
Recent Comments