Don't get scammed by fake online requests to help a friend online. Check your facts first - here's why.
Read moreLaw Enforcement Disrupts VPN Services Enabling Cybercrime
December 22 2020The United States and international partners shut down three bulletproof hosting services used to facilitate criminal activity.
Read moreEavesdropping on Phone Taps from Voice Assistants
December 22 2020
The microphones on voice assistants are very sensitive, and can snoop on all sorts of data:
In Hey Alexa what did I just type? we show that when...
Read more
The SaC approach lets users codify and enforce a secure state of application configuration deployment that limits risk.
Read moreCisco, Intel, Deloitte Among Victims of SolarWinds Breach: Report
December 21 2020The Wall Street Journal identified 24 businesses so far that have downloaded the SolarWinds software infected with malicious code.
Read moreNSA, CISA Warn of Attacks on Federated Authentication
December 21 2020While incident responders focus on attacks using SolarWinds Orion, government cyber defenders highlight other methods likely being used as well.
Read more7 Infamous Moments in Adobe Flash’s Security History
December 21 2020End-of-life is here: Adobe's support for Flash is gone as of Jan. 1. Here's what we won't miss about the multimedia software platform.
Read moreLet's prioritize bipartisan strategic actions that can ensure our national security and strengthen the economy. Here are five ideas for how to do that.
Read moreCellebrite Can Break Signal
December 21 2020
Cellebrite announced that it can break Signal. (Note that the company has heavily edited its blog post, but the original — with lots of technical details —...
Read moreNaked Security Live – Watch out for Messenger scams
December 21 2020Here's the latest Naked Security video talk - watch now! (And please share with your friends...)
Read more
Recent Comments