Don't abandon that domain name
Penny-wise, pound-foolish: Letting old domain names expire might save a few bucks a year, but lets attackers register your old domain and pretend to be you.
J.M. Porup | 27 Aug | Read more
Penny-wise, pound-foolish: Letting old domain names expire might save a few bucks a year, but lets attackers register your old domain and pretend to be you.
J.M. Porup | 27 Aug | Read more
Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.
J.M. Porup | 23 Aug | Read more
The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.
J.M. Porup | 07 Aug | Read more
Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.
J.M. Porup | 31 Jul | Read more
The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.
J.M. Porup | 12 Jul | Read more
Lawyers have been slow to adopt modern security technology — and even slower to respond to security threats. That may be changing.
J.M. Porup | 10 Jul | Read more
A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market
J.M. Porup | 25 Jun | Read more
Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.
J.M. Porup | 18 Jun | Read more
Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.
J.M. Porup | 31 May | Read more
With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.
J.M. Porup | 19 Apr | Read more
"This is gold" for a nation-state attacker that wanted to hack an election.
J.M. Porup | 05 Apr | Read more
How password reuse and third-party breaches leave voting machine vendors vulnerable to attack.
J.M. Porup | 30 Mar | Read more
The 2012 LinkedIn breach, along with other old third-party breaches, is still paying dividends for criminals, who now have free access to 1.4 billion previously exposed email addresses and passwords.
J.M. Porup | 29 Mar | Read more
Journalists have a giant red target on their backs. How can we defend ourselves?
J.M. Porup | 21 Mar | Read more
Patching is useless most of the time, industrial control systems (ICS) security expert tells Senate committee.
J.M. Porup | 07 Mar | Read more