Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Online fraudsters usually claim to have information or authority they don’t have. Be on alert this holiday season. → Read More
Ransomware is a particularly malicious strain of malware. Following best practices is your best defense, but it’s important to know what to do if disaster strikes. → Read More
Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. → Read More
DNS security is a decades-old issue that shows no signs of being fully resolved. Find out the problems with proposed solutions and the best way to move forward. → Read More
Learn why single sign-on password solutions aren't all they're cracked up to be, and get the basics of effective enterprise password management. → Read More
The new iOS devices with the Secure Enclave were supposed to be unhackable, even by Apple, but they aren't. What could Apple do to fix this? → Read More
The Adobe Flash browser plugin is a dynamite product. Incredibly useful and easy to use, but do the wrong thing and BOOM! I've been trying, with only limited success, to free myself of it. → Read More
The details Microsoft provided for the Patch Tuesday updates to Windows 10 are vague and unactionable, but that's usually all we've ever gotten from them. → Read More
When the Internet is down for us, many of the things we do become unavailable. Many organizations are, in effect, crossing their fingers rather than planning in earnest. → Read More
At the enterprise level IAM and SAML mitigate the password problem. Out on the civilian Internet our best attempts, mainly OAuth and OpenID, have fallen short. Passwords are a problem that will be with us for a long time. → Read More
If Microsoft has enough patience to stick with it, Windows Phone could be a much more successful platform within a few years. The future is the mobile web. → Read More
Finally Microsoft has provided a way to unify endpoint management of mobile devices and Windows desktops, but it's doomed to many years of impracticality. → Read More
A Google researcher found a privilege elevation bug in Windows. After 90 days he made it public. He gives no indication that he contacted Microsoft. → Read More
The only real surprise I see is a good one having to do with Windows XP and Office 2003. There was other good news and lots of bad. → Read More
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management. → Read More
After largely avoiding Windows 8, I really got to like Windows 8.1. When Windows 10 comes along I'll feel a lot better about it and so, I suspect, will everyone else. → Read More
An attacker can introduce persistent boot ROM malware using an "evil maid" attack through the MacBook Thunderbird ports. → Read More
The Chinese government has been working for a long time on replacing foreign, largely American, technology with home-grown alternatives, but conditions are much better for them than in the past. → Read More
The main lesson I take from the WordPress RevSlider attacks is that, for self-hosters, vigilance is absolutely necessary, but perhaps not enough, to keep your WordPress site secure from attack. → Read More
E-mail credentials and a key DNS zone system were compromised. The severity of the damage is not yet clear. → Read More