We’ve been promised an end to passwords before, so I wouldn’t hold my breath. And of course our public computers won’t make this easy on anybody. Still, the fact that the major tech giants are all agreeing on something could be cause for celebration, right?
Category: Security
CIL2007
This week, there is news that US Government is launching a bug bounty program, and Meta (Facebook) is offering
“Pegasus” is a spyware system developed to investigate and prevent terrorism and serious crime. Made by Israeli cybersecurity company NSO Group, it is sold only…
As the internet was originally a U.S. Department of Defense project, huge swaths of addresses were allocated to the DoD. IP addresses have become increasingly…
In early March, Microsoft detected multiple 0-day exploits against Exchange Servers, urging customers to update their on-premises systems immediately. They developed a one-click mitigation tool to…
Last summer, I suddenly began appearing upside-down in virtual meetings. It was an amusing little glitch: I use my laptop in tent mode while I…
Last week, Brian Krebs broke the story that some unknown actor was trying to disrupt Trickbot, an enormous collection of two million infected computers which…
The spelling of the word “phishing” was influenced by the earlier word “phreaking,” which described the hacking of telephone systems. And now the word evolves…
Regardless of whether the WhatsApp messages are to blame, “the biggest takeaway from this,” writes Sheera Frenkel of the New York Times, “is that anyone, anywhere, can be hacked if the person carrying out the attack has enough time, money and patience.”
Last week, the bill creating Ohio’s Cyber Reserve passed the legislature and headed to Governor DeWine for his signature. The Cyber Reserve will consist of…