Obi-Wan Kenobi in terms of information security
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
3876 articles
How things stood with information security in a galaxy far, far away — nine years before the Battle of Yavin.
Our experts discovered a fresh version of CosmicStrand, a rootkit that hides from researchers in the UEFI firmware.
We review a major cryptocurrency theft using spyware inside a PDF.
The new Luna and Black Basta ransomware strains are capable of attacking Windows, Linux and VMware ESXi.
We review a recent study on biometric authentication that uses breath analysis.
How scammers swindle users out of cryptocurrency through a fake Nvidia giveaway supposedly worth 50,000 BTC.
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
The most effective protection is increasing employees’ awareness, and it’s up to HR to maintain it.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
One of the most complex, yet easy to understand, infosec studies of recent times.
How scammers lure YouTube users to a fake website where a purported bug lets them exchange Bitcoin at an excellent rate.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
How cybercriminals extract bank card details pretending to be DHL.
Why the future belongs to neuromorphic processors, and how they differ from conventional processors in modern devices.
Five arguments in favor of installing security solutions on the endpoints of a small company.
Deep analysis of modern ransomware allows you to implement universal methods to counter them.
An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.