Security news that informs and inspires

All Articles

665 articles:

Digital Security Exchange Forges Connections to Protect Those in Need

The Digital Security Exchange is helping to connect at-risk groups with security experts who can help protect them.

Privacy

AMD Releases Spectre Mitigations

AMD has released mitigations for the Spectre vulnerability that affects some of its processors.

Vulnerability

WebAuthn Offers a Glimpse Into a Potentially Password-Less Future

The WebAuthn specification from the W3C could make password-free authentication a reality in the near future.

Multifactor Authentication

In the Cellular ‘Cesspool,’ Spies and Crooks Have Their Way

The Internet is a hostile environment for many users, and cellular networks, unfortunately, are simply an extension of that.

Privacy

Web Application Bugs, From Disclosure to Exploit

Just because a vulnerability exists doesn’t automatically mean it will get exploited. It turns out the popularity of the software matters, but so does where the vulnerability information is published.

Web App Security, Web App Attacks

How a Researcher Found the Panera Data Leak

Security researcher Dylan Houlihan discovered an issue that leaked data from the Panera Bread site, including customer names, phone numbers, and other information.

Data Breaches

Facebook Moves to Restrict Access to User Data

Facebook is making privacy changes designed to restrict apps' access to user data.

Privacy, Facebook

Here Come the Malicious Cryptominers

Malicious cryptominers are taking over for ransomware, thanks to quicker ROI and less attention from law enforcement.

Cryptomining, Cryptocurrency

Here’s Why Chrome is Scanning Your Computer for Malware

Recent reports have highlighted Chrome Cleanup, a lesser-known security feature in Chrome that looks for potentially harmful software that can potentially hijack the web browser. While good for user security, Google should make information about the tool easier to understand and easier to find.

Google

Empathy for Security Victims, Not Blame

Whenever there is a breach or security incident, the infosec quarterbacks are out in full force, speculating what went wrong and pointing out what "should" have been done. Empathy is needed to share what worked and what didn't, not smug superiority. Security is for everyone.

Internet

Data Brokers, Social Media, User Privacy

Facebook is severing ties with data brokers, those companies that sit on piles of user data such as voter rolls, property records, purchase histories, and other databases. It's bad news for advertisers, but will it improve user privacy?

Privacy

BranchScope: Another Processor-Based Attack

Much like Spectre, BranchScope is an attack that focuses on the processor's branch prediction system. That doesn't mean the processors are hopelessly vulnerable. It just means that as more researchers start exploring various features in modern CPUs, more issues will be found.

Hardware, Security Research

New DIY Method Lets Researchers Recover Data from Hardware Chips

Many Internet of Things manufacturers handled security by disabling hardware debugging and locking down the firmware. Security researchers need to bypass these barriers so that they can find and help fix the actual security issues. A researcher talks about a technique gets researchers down to the silicon level.

Hardware Hacking, Security Research

Washington, Facebook, and the Privacy Reckoning

Federal legislators are asking Facebook, Google, and Twitter executives to come to Washington to discuss privacy concerns.

Privacy, Facebook

GitHub Alerts Help Fix Bugs in Ruby, JavaScript Code

When GitHub unveiled its Security Alerts scanning feature last November, it was betting that if project owners knew which software components they were using had vulnerabilities, they would update them with patched versions. GitHub said that by Dec. 1, 450,000 vulnerabilities had been resolved, either by removing the dependency entirely or swapping out with a more recent, patched version. That's a little over 10 percent of the vulnerabilities addressed, right off the bat.

App Security, Vulnerability, Software Security