6 questions CISOs should ask if their cybersecurity vendor is acquired
The sharp increase in funding and mergers-and-acquisition (M&A) activity in the cybersecurity industry over the last year has brought into focus the challenges that organizations...
Developer sabotages own npm module prompting open-source supply chain security questions
The developer of a popular JavaScript component hosted on the npm repository decided to protest Russia's invasion of Ukraine by adding code to his own...
Friday Squid Blogging: The Costs of Unregulated Squid Fishing
Greenpeace has published a report, “Squids in the Spotlight,” on the extent and externalities of global squid fishing. News article. As usual, you can also...
Ugandan Writers Charged with Cyber Stalking President
Author and journalist arrested over alleged cyber stalking of Ugandan President Yoweri Museveni Read More
A Third of Malicious Logins Originate in Nigeria
Spear phishing study finds one in three malicious logins into compromised accounts came from Nigeria Read More
Russian Hackers Allegedly Compromise Ukrainian News Sites, Displaying ‘Z’ Symbol
The 'Z' symbol was displayed on multiple Ukrainian news sites, allegedly perpetrated by Russian hackers Read More
Arkansas Sues Health System for Abandoning Patient Files
Suit alleges Eastern Ozarks Regional Health System failed to protect patient and employee data Read More
Netflix to Charge Password Sharers
Streaming service to charge Latin American users who share password with non-householders Read More
How to Protect Yourself from March Madness Scams
It’s the month of top seeds, big upsets, and Cinderella runs by the underdogs. With March Madness basketball cranking up, a fair share of online...
Why Vaccine Cards Are So Easily Forged
My proof of COVID-19 vaccination is recorded on an easy-to-forge paper card. With little trouble, I could print a blank form, fill it out, and...