-
+21 +6New Mac ransomware is even more sinister than it appears
ThiefQuest or EvilQuest can grab passwords and credit card numbers.
-
+29 +6The Scientist and the Spy — intellectual property and industrial espionage - The China Story
In the current climate of escalating competition and tension between the United States and China on the technology front, Mara Hvistendahl’s The Scientist and the Spy: A True Story of China, the FBI, and Industrial Espionage is a very timely book that illuminates the various facets of the nexus between intellectual property protection, industrial espionage and national security.
-
+22 +7Huawei is a national security threat, warns ex-Google boss
Ex-Google boss Eric Schmidt has warned that Huawei poses a national security threat and claims “there’s no question” information from its routers have “ultimately ended up” in the hands of the Chinese government. Mr Schmidt, current chair to the Defence Innovation Advisory board for the Pentagon, said the telecoms firm had engaged in acts vthat are not acceptable in national security.”
-
+39 +2Odds are we'll all soon move to Desktop-as-a-Service
I still love my standalone desktops. But with the coronavirus pandemic forcing more people to work from home, it's becoming clear, we're doing a lousy job of protecting our PCs. The only real answer: Desktop-as-a-Service (DaaS).
-
+10 +1Intel will soon bake anti-malware defenses directly into its CPUs
Control-Flow Enforcement Technology will debut in Tiger Lake microarchitecture.
-
+26 +3Researchers say online voting tech used in 5 states is fatally flawed
Elections in five states have used or plan to use OmniBallot's online voting tech.
-
+20 +3List of well-known web sites that port scan their visitors
Many well-known and heavily used web sites are using a fraud protection script that port scans your local computer for remote access programs.
-
+10 +1Schneier on COVID-19 Contact Tracing Apps
My problem with contact tracing apps is that they have absolutely no value," Bruce Schneier
-
+14 +1Securing Linux's master sysadmin command: Sudo
There's a new release of the open-source Linux command sudo, and it comes with improved auditing, logging, and security.
-
+15 +2Intel Confirms Critical New Security Problem For Windows Users
This new "evil maid" security vulnerability exposes Windows PCs to physical hacking risk.
-
+21 +1Pentagon official: FCC decision on 5G threatens GPS, national security
Pentagon officials on Wednesday criticized the Federal Communications Commission's (FCC) recent decision to allow Virginia-based satellite communications company Ligado to deploy a nationwide mobile network...
-
+10 +1Technology winners and losers in the days of COVID-19
The coronavirus pandemic is revealing just where our technology is up to the challenge and where it's failing.
-
+25 +5Poor encryption exposes biometric database of 4.5 million Israeli citizens
The private information of some 4.5 million Israeli citizens, including biometric facial features, stored in the Transportation Ministry database for drivers licenses and a private database for smart biometric bus cards, is not getting the highest-level encryption and security to prevent data breaches or exploit attempts, found a report by the State Comptroller, writes the Jerusalem Post.
-
+13 +2How to See Who's On Your Wi-Fi
Is your internet sluggish? If you suspect a neighbor is stealing your Wi-Fi, these two apps can help you identify devices using your connection and help you boot them off.
-
+22 +3How close are we to breaking encryption with quantum computing?
Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it.
-
+20 +4NordVPN unveils first mainstream WireGuard virtual private network
NordVPN, a leading VPN company, is adopting the new open-source WireGuard virtual private network technology across its product line.
-
+14 +1The trouble with 2fa
With a large percentage of your workforce now working remotely, two-factor authentication (2fa) can make them (or your company data) safer online. But how you're doing it now probably isn't helping much at all.
-
+18 +2The coronavirus is revealing our technology blunders
From Zoom’s endless security holes to the revelation that Cobol is still alive and sickly inside our critical government infrastructure, we’re discovering to our chagrin that a lot of our technology is far from disaster-proof.
-
+12 +1How to Cover Your Tracks Every Time You Go Online
Venture online nowadays, and your presence is immediately logged and tracked in all manner of ways. Sometimes this can be helpful—like when you want to see new movies similar to ones you've watched in the past—but very often it feels invasive and difficult to control. Here we're going to show you how to cover some of those tracks, or not to leave any in the first place. This isn't quite the same as going completely invisible online, or encrypting every single thing you do. But it should help you sweep up most records of your online activity that you'd rather disappear.
-
+26 +5Attackers can bypass fingerprint authentication with an ~80% success rate
Fingerprint-based authentication is fine for most people, but it's hardly foolproof.
Submit a link
Start a discussion




















