Using the iPhone Recovery Key to Lock Owners Out of Their iPhones Security This a good example of a security feature that can… rooter April 21, 2023 2 min read 0
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack Security Similarities with newly discovered Linux malware used in Operation DreamJob… rooter April 21, 2023 1 min read 0
New Zero-Click Exploits Against iOS Security CitizenLab has identified three zero-click exploits against iOS 15 and… rooter April 20, 2023 1 min read 0
The EU’s Cyber Solidarity Act: Security Operations Centers to the rescue! Security The legislation aims to bolster the Union’s cyber-resilience and enhance… rooter April 20, 2023 1 min read 0
PC running slow? 10 ways you can speed it up Security Before you rush to buy new hardware, try these simple… rooter April 20, 2023 1 min read 0
EFF on the UN Cybercrime Treaty Security EFF has a good explainer on the problems with the… rooter April 19, 2023 1 min read 0
Join my Twitter Subscription for the Inside Word on Data Breaches Security Presently sponsored by: Kolide ensures only secure devices can access… rooter April 19, 2023 4 min read 0
Discarded, not destroyed: Old routers reveal corporate secrets Security When decommissioning their old hardware, many companies ‘throw the baby… rooter April 19, 2023 1 min read 0
Kodi Confirms Data Breach: Over 400k User Accounts Compromised Security Kodi, the popular media player software, has recently confirmed a… rooter April 18, 2023 1 min read 0
Using LLMs to Create Bioweapons Security I’m not sure there are good ways to build guardrails… rooter April 18, 2023 3 min read 0