
The chronicle of WannaCry
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
48 articles
Security evolution: The large-scale, but short-lived ransomware epidemic of 2017.
Using a recent study on hardware vulnerabilities in processors as an example, we contemplate the cost of security.
Google Play’s app descriptions have a new Data Safety section now. We explain why this isn’t such great news.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
The story of the first serious attack on corporate IT infrastructure.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
We review a recent study on biometric authentication that uses breath analysis.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
One of the most complex, yet easy to understand, infosec studies of recent times.
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We cite an interesting study on how the mute button actually works in teleconferencing services, and discuss privacy in the web conferencing era.
We explain why game mods can be dangerous, using as an example malicious mods for Cities: Skylines.
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
Methods of reasonable protection against potential freelancer related cyberthreats.
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
A cyberattack has affected an unexpectedly large number of industrial systems.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.