Hacking Pickleball
My latest book, A Hacker’s Mind, has a lot of sports stories. Sports are filled with hacks, as players look […]
My latest book, A Hacker’s Mind, has a lot of sports stories. Sports are filled with hacks, as players look […]
This a good example of a security feature that can sometimes harm security: Apple introduced the optional recovery key in
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is
CitizenLab has identified three zero-click exploits against iOS 15 and 16. These were used by NSO Group’s Pegasus spyware in
The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents
Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again –
EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being negotiated in Vienna. The
Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Zero Trust tailor-made for Okta. Book
When decommissioning their old hardware, many companies ‘throw the baby out with the bathwater’ The post Discarded, not destroyed: Old
Kodi, the popular media player software, has recently confirmed a data breach that has impacted around 400,000 users. The breach