Hackers: The third pillar of security Security Every business knows that to maintain security, you need the… rooter February 20, 2023 1 min read 0
Red teaming – 5 tips on how to do it safely Security Red team vs blue team exercises are a very effective… rooter February 20, 2023 1 min read 0
Fines as a Security System Security Tile has an interesting security solution to make its tracking… rooter February 20, 2023 2 min read 0
Friday Squid Blogging: Thermal Batteries from Squid Proteins Security Researchers are making thermal batteries from “a synthetic material that’s… rooter February 17, 2023 1 min read 0
Search ads abused to spread malware – Week in security with Tony Anscombe Security Threat actors used search engine ads to impersonate makers of… rooter February 17, 2023 1 min read 0
Defending against AI Lobbyists Security When is it time to start worrying about artificial intelligence… rooter February 17, 2023 7 min read 0
Security amidst a global frost Security No longer relegated to a side-show, tech is embedded into… rooter February 16, 2023 1 min read 0
ChatGPT Is Ingesting Corporate Secrets Security Interesting: According to internal Slack messages that were leaked to… rooter February 16, 2023 1 min read 0
These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia Security ESET researchers have identified a campaign using trojanized installers to… rooter February 16, 2023 1 min read 0
10 signs that scammers have you in their sights Security Don’t be their next victim – here’s a handy round-up… rooter February 16, 2023 1 min read 0