Security news that informs and inspires

All Articles

2349 articles:

NIST Outlines How to Secure BGP

The Internet relies on BGP, but the protocol doesn't have any security protections to prevent route hijacking. NIST's draft paper outlines techniques for securing BGP for a safer Internet.

Government, Nist, Internet, Networking

Facebook and Twitter Move to Fight Disinformation Campaigns

The two dominant social media platforms are changing the way they verify users in an effort to fight foreign influence operations.

Facebook, Twitter, Disinformation

Five Eyes Countries Press for Encryption Laws

The governments of the Five Eyes countries say that if tech companies can't help find a way to provide access to encrypted data, laws may be the answer.

Encryption

Firefox Will Soon Block Trackers by Default

Mozilla is moving to block all web trackers by default in an upcoming release of Firefox.

Privacy

Android Bug Allows Geolocation of Users

There's a flaw in Android that allows an attacker to capture the MAC address and other information to track users.

Google, Android

Windows Task Scheduler Flaw Has Temporary Fix

Windows administrators don't like zero day vulnerabilities. The good news about the new flaw in the TaskScheduler service is that a hotfix, or a micropatch, is available.

Microsoft

Competing Election Security Bills Stuck in Senate

Two separate election security bills, with different concepts of how to fix the problem, are both mired in committee in the Senate.

Election Security, Government

Decipher Podcast: Andy Greenberg

Andy Greenberg of Wired magazine joins Dennis Fisher to talk about the incredible story of the NotPetya malware outbreak.

Podcast, Malware

Labs Presents: RFID-Blocking Gear

Mark Loveless from Duo Labs goes on camera to show how he tested RFID-blocking gear such as sleeves, wallets, and purses. Which one gives you the most protection for your money?

Labs Research, Iot Security

Zero Trust and Digital Transformation

Digital transformation is on every CEO's mind as they worry that not adapting to the new technology-driven world will means the business will eventually fail. How does zero trust benefit digital transformation?

CISO, Zero Trust

Senators Want Independent Security Testing of Voting Machines

Four influential senators are asking a voting machine vendor to allow security researchers to test their products.

Election Security

Labs Presents: What’s Happening With RFID Blocking Gear?

With all the reports about criminals lifting information off credit cards, access cards, and even passports, does it make sense to buy one of those RFID-blocking sleeves and wallets? Duo Labs finds out in this Decipher report.

Labs Research, RFID, Hardware

Decipher Black Hat Panel

Decipher's Black Hat panel featured editors Dennis Fisher and Fahmida Rashid, along with fellow journalists, security researchers, and marketing executives in a broad discussion of security topics.

Black Hat

History Suggests Attackers Will Hit Struts Flaw Quickly

The open source Struts web application framework has a target on its back. Attackers are likely developing exploits. Is it time to stop using Struts?

Vulnerability, Patching

What Defenders Need to Know About the Latest Struts Flaw

It hasn’t even been a year since the Equifax breach was made public, and Apache has fixed yet another another critical vulnerability in the Struts web application framework. Does your incident response plan include assessing the risk exposure and deploying defenses on top of patch management?

Patching, Vulnerability, Java, Incident Response