More people than ever are trying to hack the US government--and they love it ~tech security.cyber Article 328 words 11 votes
Four in five CISOs have been told to downplay a potential risk’s severity ~comp security.cyber Article 661 words 9 votes
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough? ~tech security.cyber Article 1378 words 4 votes
Four insecure standards we can't easily abandon ~tech Article 1225 words, published Oct 14 2021 11 votes
Sinclair Broadcast Group was hit by ransomware over the weekend ~tech security.cyber Article 229 words 13 votes
Election security at the chip level – or, why your electronic voting options might not get better any time soon ~tech security Article 2189 words, published Jan 2 2020 5 votes
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year ~tech security.cyber Article 608 words 8 votes
Invisible malware is here and your security software can't catch it ~tech security Article 1121 words 6 votes
SELinux's approach (restrict everything unless explicitly permitted) is the opposite of Linux's (permit everything unless explicitly forbidden). That makes setup different, ~tech linux security Article 2622 words 4 votes
DNS security is a decades-old issue that shows no signs of being fully resolved. Here's a quick overview of some of the problems with proposed solutions and the best way to move forward. ~comp security Article 1676 words 9 votes
Cybersecurity experts from Homeland Security, the National Intelligence director's office, and private industry discussed how they're working to counter the most urgent threats ~tech security.national security.cyber Article 1976 words 3 votes
Reddit servers breached; full backup from 2007 (including hashed+salted passwords) obtained by attackers ~tech security social media Link 77 votes
Evolving Chrome's security indicators - October 2018 (Chrome 70) release, all HTTP sites to be marked with red "not secure" indicator when inputting data ~tech browsers Article 219 words 9 votes
This is how internet regulation can go really wrong ~tech privacy internet Article 1213 words 4 votes
EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails ~tech Link 5 votes
Cambridge Analytica: How did it turn clicks into votes? ~tech social media Article 2206 words 5 votes