-
+49 +1Snowden's New App Turns Your Phone Into a Home Security System
The NSA leaker's latest project aims to secure your computer—and you—from not just digital but physical attacks.
-
+14 +1“username or password incorrect” is bullshit
There’s a security best practice where sign ins aren’t supposed to say “password is incorrect”. Instead they’re supposed to say the “username or password is incorrect”. This “best practice” is bullshit.
-
+14 +1US to blame North Korea for 'WannaCry' cyber attack
The White House will blame North Korea for a May cyber attack that paralyzed businesses and government entities, sources told Reuters
-
+14 +1The WIRED Guide to Digital Security
In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor.
-
+26 +1Firefox will soon flag sites that have been hacked
Firefox has having a good run right now, having just released its much speedier and better-looking Quantum browser. It's now working on a new feature that security fans are bound to like: It will warn you if you're visiting a site that has suffered a data breach. Firefox is working on the feature in collaboration with "Have I Been Pwned," the popular site that can check your email and tell you if your credentials have been stolen by hackers.
-
+20 +1Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them
Moscow-based AV provider challenges claims it helped Russian spies.
-
+31 +1He Perfected a Password-Hacking Tool—Then the Russians Came Calling
How a program called Mimikatz became one of the world's most widespread and powerful password stealers.
-
+32 +1Senators push to ditch Social Security numbers in light of Equifax hack
Eyeing more secure alternatives to Social Security numbers, lawmakers in the U.S. are looking abroad. Today, the Senate Commerce Committee questioned former...
-
+17 +1MINIX — The most popular OS in the world, thanks to Intel
You might not know it, but inside your Intel system, you have an operating system running in addition to your main OS, MINIX. And it’s raising eyebrows and concerns. By Bryan Lunduke.
-
+21 +1How to Keep Your Bitcoin Safe and Secure
Bitcoin and other cryptocurrencies have exploded in value—making them an ever-more attractive target for scammers and hackers. Here's how to protect investment.
-
+26 +1Malware hidden in vid app is so nasty, victims should wipe their Macs
If you downloaded and installed stuff from Eltima yesterday, you are totally screwed
-
+25 +1Malware in firmware can be as equally creative as it can be destructive
Malware in firmware can be both creative and destructive and runs before the OS loads and target components in order to modify or subvert their behavior. By Cassius Puodzius.
-
+14 +1Here's Everything You Need to Know About Today's Massive Wi-Fi Hacking Attack
A huge vulnerability in Wi-Fi that fundamentally breaks the security we use to protect our wireless networks has just been exposed.
-
+20 +1WPA2 wifi security is vulnerable to hacking, US government warns
WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed
-
+21 +1Changes in NIST Password Best Practices - Schneier on Security
NIST recently published its four-volume SP800-63-3 Digital Identity Guidelines. Among other things, it makes three important suggestions when it comes to passwords:
-
+17 +1Wary of Hackers, States Move to Upgrade Voting Systems
New equipment and security protocols are part of the response to Russian meddling in 2016. But lack of money is an obstacle.
-
+28 +1Equifax takes down web page after report of new hack
Equifax Inc said on Thursday it has taken one of its customer help website pages offline as its security team looks into reports of another potential cyber breach at the credit reporting company, which recently disclosed a hack that compromised the sensitive information of more than 145 million people.
-
+1 +1Navigating the Critical First 48 Hours of a Data Breach
Does your company have a detailed incident response plan in the event that your systems are breached and potentially sensitive data is seized? The first 48 hours after a data breach is discovered are a critical period when the reputation of the company is on the line—and, as hours turn into weeks, so are potentially
-
+5 +1Medical IoT devices: security nightmares that keep CIOs up late at night
Healthcare is among the best reasons for Internet of Things adoption. But IoT security problems can create science-fiction-like damage scenarios. Experts advise how IT can keep medical IoT devices safe, and what to do if an attack hits.
-
+5 +1Schneier: On the Equifax Data Breach
Surveillance capitalism fuels the Internet, and sometimes it seems that everyone is spying on you. You're secretly tracked on pretty much every commercial website you visit.
Submit a link
Start a discussion




















