-
Microsoft 365 Phishing Attack Makes Comeback
Vintage cyber-attack tactic revived to phish Microsoft 365 users Read More
-
PRC Firm Allegedly Stole Motorola’s Secrets
Hytera Communications Corp accused of hiring Motorola employees to steal DMR technology Read More
-
Amy Zegart on Spycraft in the Internet Age
Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt: In short, data volume and accessibility are revolutionizing sensemaking. The intelligence playing field is leveling — and not in a good way. Intelligence collectors are everywhere, and government spy agencies are drowning in data.…
-
Google Cloud adds agentless threat detection to virtual machine workloads
As more enterprise computing workloads are moving to the cloud, so are the attackers. Virtual servers have been targeted by cryptomining and ransomware groups over the past few years, and they typically don’t benefit from the same levels of protection as endpoints. Google has set to change that with VM-based threat detection for its cloud…
-
How We Can All Work Together For a Better Internet
Let’s face it – we would not be the same people we are today if it wasn’t for the internet. The internet has opened our eyes to so much information that we are privileged to have right at our fingertips. However, it’s important to remember that with so many individuals with access to the web,…
-
Private browsing vs VPN – Which one is more private?
As people turn to the Internet for news and answers to tough questions, it only makes sense that it would come to know you better than your closest friends and family. When we go online for answers to personal questions, we’re sharing our deepest secrets with search engines. While some people are happy to share that level of…
-
New Research Reveals Large Salary Rises for Cybersecurity Workers
The salary guide provided the median salaries across 10 major job roles in cybersecurity Read More
-
A US hacker blasted North Korea off the internet following missile tests
Last month, as North Korea’s supreme leader Kim Jong-un oversaw a series of sabre-rattling hypersonic missile tests, cyber attacks disrupted the country’s internet infrastructure. But who was responsible? Read more in my article on the Hot for Security blog. Read More
-
Unraveling the climate change and Cybersecurity connection
This blog was written by an independent guest blogger. Cybersecurity and climate change. These two issues seem, at least on the surface, like they couldn’t be farther apart. One conjures Matrix-like, futuristic visions of tech bros and shadowy figures hunched over laptops. The other, third-world dystopias, famine, and mass extinction. However, a deeper dive into…
-
#SaferInternetDay: Porn Sites Face Legal Duty to Verify Age of UK Users
#SaferInternetDay: Porn Sites Face Legal Duty to Verify Age of UK Users Pornographic websites will be legally obliged to introduce robust checks to verify the age of users under new plans published by the UK government. The measure is designed to protect children from accessing pornography from commercial providers. Announced on Safer Internet Day, the…