Nick Weaver on Regulating Cryptocurrency
Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing…
Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing…
Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Device Trust tailor-made for Okta. Book…
ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol The post…
This Acunetix release introduces a new security check for the Fortinet RCE flaw (CVE-2022-39952). The FortiNAC, a network security solution,…
Good grief, LastPass.. The popular password management firm with a motive of safeguarding people’s sensitive information, has become a breach…
Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences…
The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality The post…
A reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s Bank.
And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in…
Following a series of major data breaches in Australia, the government is undertaking a significant overhaul of its cyber security…