Security news that informs and inspires

2258 articles by

‘Microsoft Was Freaking Out‘: An Oral History of the LØpht, Part 2

As the L0pht hacker group matured new members like Mudge and Dildog joined and the group began publishing security advisories on Microsoft Internet Explorer.

L0pht

Why We Can’t Have Nice Things (Only Secure Ones)

Technology promised to make things better, but we are getting far less than what we were promised. Add security into the mix, and things have gone terribly wrong in the usability department. We need to look at security as a process and consider the impact of all the steps; not be solely focused on individual steps.

CISO, 2 Factor Authentication

A Word From the Decipher Editors

Newcomers to information security frequently don't know where to begin, and industry veterans need information that goes beyond the initial news to understand the implications and impact.

Decipher

‘We Got to Be Cool About This‘: An Oral History of the LØpht, Part 1

Born from the Boston BBS scene of the 1980s, the L0pht emerged in the 1990s as one of the more influential hacker groups ever and helped spawn the security industry as we know it today.

L0pht

Are You Your Phone Number? Identity in Mobile Apps

We tend to think of phone numbers as part of our identity, and that impression is reinforced when we use our phone numbers to register for mobile apps. For many mobile apps, however, phone number is a handy username. We are still looking for a proper identifier in the mobile world.

Mobile, Authentication, Identity Proofing