Naked Security Live – When is a bug bounty not a bug bounty?
February 15 2021Latest episode - watch now!
Read moreLatest episode - watch now!
Read moreUsers' distrust of corporate security teams is exposing businesses to unnecessary vulnerabilities.
Read moreMore good news in the cybercrime law-and-order world, this time a bust of ransomware crooks.
Read moreConsumer banks, exchanges, payment firms, and card issuing companies around the globe were among those hit.
Read moreHave a new idea, a lesson learned, or a call to action for your fellow cybersecurity professionals? Here's how to submit your Commentary pieces to Dark Reading.
Read more
At the virtual Enigma Conference, Google’s Project Zero’s Maggie Stone gave a talk about zero-day exploits in the wild. In it, she talked about how often vendors...
Read more
Bloomberg News has a major story about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It’s been going on since at least 2008. The US...
Read moreHow squid fly. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.
Read moreSonja Drummer describes (with photographs) two medieval security techniques. The first is a for authentication: a document has been cut in half with an irregular pattern, so that the...
Read moreIf past cyberattacks are any indication, success begets imitation. In the wake of last week's hack of Florida water utility, other water utilities and users of remote desktop software...
Read more
Recent Comments