Bad biometrics: Samsung’s new S10 phone

When biometrics work properly, they can provide you with an easy to use security solution with a reasonable level of ...
Time to end the cloud-o-phobia

Time to end the cloud-o-phobia

Sorry, but I felt no need to purchase a monocle so I could have it pop out of my eye ...
Security risks from domain typo squatters

Security risks from domain typo squatters

One of the ways that hackers get users to click on malicious links or believe false emails is to use ...
Operation InfeKtion: How Russia Perfected the Art of War | NYT Opinion

The war we try to ignore

As information security professionals, our goal is to protect information against attacks on confidentiality, integrity and availability. Today, I want ...
Even with security flaws, you should be using a password manager

Even with security flaws, you should be using a password manager

Yesterday, the Washington Post ran an article about some important security research on password managers, describing a number of serious vulnerabilities in some of the most popular products in this space. However, ...
Things to worry about in 2019

Things to worry about in 2019

| | online security
In this post, I wanted to take a break from telling you what *I* think the things that should keep you awake at night (at least from an information security point of ...
2

What does your password say about you?

Using what we security experts call “crappy passwords” can be the first step in a journey to identity theft and all of its attendant miseries. If you are using Google Chrome to ...
How well do email security gateways protect against targeted attacks?

How well do email security gateways protect against targeted attacks?

Email security test explores how and when services detect and stop threats. Latest report now online. This new email protection test shows a wide variation in the abilities of the services that ...
Join the most secure one per cent of internet users - in minutes

Join the most secure one per cent of internet users – in minutes

Hackers have spent well over 20 years stealing users' passwords from internet companies. They've almost certainly got yours. The good news is it's very easy to make your passwords useless to hackers ...
IMG_0097.jpg

Not all two factor authentication is created equal

| | online security
Two factor authentication is an important security tool; by using 2FA, an attacker get ahold of your user name and password still can’t get into your accounts. But not all two factor ...
Loading...