The new tools are meant to help the developers of password managers and Apple hopes the tools will reduce the instances where users chose their own password rather than rely on the password manager.
National Geographic has a photo of a 7-foot long shark that fought a giant squid and lived to tell the tale. Or, at least, lived to show off the suction marks on his skin. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...
eCh0raix ransomware gang returns with a new wave of attacks against QNAP NAS devices.
I just published a new paper with Karen Levy of Cornell: "Privacy Threats in Intimate Relationships." Abstract: This article provides an overview of intimate threats: a class of privacy threats that can arise within our families, romantic partnerships, close friendships, and caregiving relationships. Many common assumptions about privacy are upended in the context of these relationships, and many otherwise effective...
Report from social media research group shows foreign diplomats and state-controlled media pounced on the US' abysmal handling of the BLM protests to attack the US as a beacon of freedom and further their own political goals.
Google's TAG team said phishing attacks against Biden and Trump campaign staffers were unsuccessful.
Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.
Zoom was doing so well.... And now we have this: Corporate clients will get access to Zoom's end-to-end encryption service now being developed, but Yuan said free users won't enjoy that level of privacy, which makes it impossible for third parties to decipher communications. "Free users for sure we don't want to give that because we also want to work...
Google said last year that it would fix a bug that allowed sites to detect incognito mode, but no fix ever came.
Hackers hijacked Coincheck's domain registrar account and then changed DNS settings.
You can now use hardware security keys to access Google apps and services running on iOS devices.
Attackers tried to download configuration files from WordPress sites so they could steal database credentials.
The former Facebook employee accuses the social network of allowing “politicians to radicalize individuals and glorify violence.”
This is interesting: The image, a seemingly innocuous sunset (or dawn) sky above placid waters, may be viewed without harm. But if loaded as wallpaper, the phone will crash. The fault does not appear to have been maliciously created. Rather, according to developers following Ice Universe's Twitter thread, the problem lies in the way color space is handled by the...
Tor Browser 9.5 is also working towards making Dark Web addresses easier to remember.
The move follows integration with services including Android and Chrome.
DopplePaymer ransomware gang claims to have breached DMI, a major US IT and cybersecurity provider, and one of NASA IT contractors.
LG has released a firmware fix in May 2020. Attack requires physical access.
Ransomware gang takes extortion to a whole new level. Threatens to auction Madonna's legal documents in a future auction.
G Suite apps that have access to Drive and Gmail data found communicating with undisclosed external services.