The number of Americans seeking Social Security disability benefits is plunging, a startling reversal of a decades-old trend that threatened the program’s solvency.
My last piece on Security Tokens, “The Flippening Is Coming”, outlined the reasons why 2019 will see more issuance of Security Tokens than Utility Tokens. Since then, the Security Token future has come in to greater focus, and it’s bigger than anyone thinks.
CrowdStrike, the developer of a security technology that looks at changes in user behavior on networked devices and uses that information to identify potential cyber threats, has reached a $3 billion valuation on the back of a new $200 million round of funding.
At AAPicks we love seeking out potentially life-changing deals. Today’s pick – The Cybersecurity Certification Mega Bundle – is a great example. Cybersecurity is worth big bucks these days, so the experts are paid handsomely.
In my last article, I talked about the opportunity that B2B brands have with influencer marketing, leveraging the 1:9:90 Model of Influence.
Camille Tuutti can’t remember all the times she’s been harassed.
New York Times national security correspondent David Sanger says U.S. officials worry that foreign powers have planted malware that could knock out critical infrastructure, including electric power. Your purchase helps support NPR programming. How?
In March, artist and programmer Brannon Dorsey became interested in a retro web attack called DNS rebinding, teaching himself how to illicitly access controls and data by exploiting known browser weaknesses.
We're afraid of risk. It's a normal part of life, but we're increasingly unwilling to accept it at any level. So we turn to technology to protect us. The problem is that technological security measures aren't free. They cost money, of course, but they cost other things as well.
You’re taught about history, science, and math when you’re growing up. Most of us, however, aren’t taught how to identify or deal with our own emotions, or the emotions of others. These skills can be valuable, but you’ll never get them in a classroom.
Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams.
Palantir Technologies has cultivated a reputation as perhaps the most formidable data analysis firm in Silicon Valley, doing secretive work for defense and intelligence agencies as well as Wall Street giants.
When the first stampede began, my plane had just landed. It started, apparently, with a group of passengers awaiting departure in John F. Kennedy Airport Terminal 8 cheering Usain Bolt’s superhuman 100-meter dash.
The content contained herein is correct as of January 2017, and represents the status quo as of the time it was written. Google’s security policies and systems may change going forward, as we continually improve protection for our customers.
• This article was originally published on 13 January 2017. It has been extensively amended (see endnotes) following a review by the Guardian’s readers’ editor. You can read his findings here
One evening in January last year, Joel Eriksson, a 34-year-old computer analyst from Uppsala in Sweden, was trawling the web, looking for distraction, when he came across a message on an internet forum. The message was in stark white type, against a black background. “Hello,” it said.
I’ve been doing Information Security (now called Cybersecurity by many) for around 20 years now, and I’ve spent most of that time writing about it as well. So I get a good amount of email asking the following question:
The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank.
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters—maybe six of them if you’re careless, 16 if you’re cautious—that can reveal everything about you.
Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease.
Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts.
While many people are pretty vigilant about their personal security, be it financial, physical, mental, or otherwise, most of us internet users are far less motivated, and much less educated, when it comes to the security of our data.
SAN FRANCISCO — To Amit Yoran, a digital security veteran, the fight between Apple and the F.B.I. over access to an iPhone can be viewed in black-and-white terms: What law enforcement authorities want is “so misguided, they simply boggle the mind.”
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”.
I have a healthy level of paranoia given the territory I inhabit. When you write things about hackers and government agencies and all that, you simply have a higher level of skepticism and caution about what lands in your e-mail inbox or pops up in your Twitter direct messages.
This story was originally published by Reveal from The Center for Investigative Reporting, a nonprofit news organization based in the San Francisco Bay Area. Learn more at revealnews.org and subscribe to the Reveal podcast, produced with PRX, at revealnews.org/podcast.
Look both ways before you cross the street. Wash your hands before leaving the bathroom. Put a seat belt on when you get in the car. Don't eat the yellow snow.These are all common sense tips for safety that people have learned, whether from parents or one really embarrassing moment in the winter.
If you want to keep yourself up at night, spend some time reading about the latest developments in cybersecurity. Airplanes hacked, cars hacked, vulnerabilities in a breathtaking range of sensitive equipment from TSA locks to voting booths to medical devices. The big picture is even scarier.
The National Security Agency is lying to us. We know that because data stolen from an NSA server was dumped on the Internet. The agency is hoarding information about security vulnerabilities in the products you use, because it wants to use it to hack others' computers.
Determining the ROI for any cybersecurity investment, from staff training to AI-enabled authentication managers, can best be described as an enigma shrouded in mystery.
Sophie is a physical penetration tester and information security consultant. She specializes in social engineering security assessments including physical, voice (vishing) and text (phishing).
Surely at this point in time we all know that cybercrime is a serious issue that affects everyone. We've heard all about password hygiene, hacking that comes from third-party vendors, and data breaches galore caused by phishing and spear-phishing. We know we could all use better password habits.
SAN FRANCISCO — In disclosing that at least 500 million of its user accounts had been hacked, Yahoo blamed an unnamed “state-sponsored actor” for the intrusion. While Yahoo customers were caught by surprise, officials in Washington were not.
Server security doesn’t need to be complicated. My security philosophy is simple: adopt principles that will protect you from the most frequent attack vectors, while keeping administration efficient enough that you won’t develop “security cruft”.
SAN FRANCISCO — “Hello Joe,” read the November 2016 email from someone identifying himself as “John Doughs.” “I have found a major vulnerability in Uber.
It's interesting work, especially because it looks at security problems in something that is supposed to improve security. I've long recommended a password manager to solve the very real problem that any password that can be easily remembered is vulnerable to a dictionary attack.
This is Episode 8 of Real Future, Fusion’s documentary series about technology and society. More episodes available at realfuture.tv. Several months ago, while I was typing a few e-mails at my dining room table, my laptop spoke to me.
Mark Zuckerberg is one of the most powerful men in the world because billions of people give Facebook, which he founded, free access to their personal data. In return, users receive carefully curated snapshots of his life: baby photos, mundane office tours and the occasional 5K.
Standing before a crowded room of entrepreneurs and investors at a conference in San Francisco last summer, former Vice President Al Gore described how climate change could be contained, possibly even reversed.
Last week we got news of the Rosebutt data breach. This is a very particular class of site and like many others we've recently seen compromised, it's highly likely that members would have preferred to keep their identities secret.
Three configurations are recommended. Pick the right configuration depending on your audience. If you do not need backward compatibility, and are building a service for modern clients only (post Firefox 27/Chrome 22), then use the Modern configuration.
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.
We talk a lot about computer security and data security here at Lifehacker, but you can never have too many reminders of the basics. Here, in a nutshell, are the security tips and habits every computer user should know.
Even though it is THAT simple, it is FAR more secure than any other login solution.(We'll define exactly what “far more secure” means, below.) What happened behind the scenes?(This is intended to quickly inform crypto-aware readers. Complete details are provided below.
In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin.
Netflix is pleased to announce the open source release of Stethoscope, our first project following a User Focused Security approach. The notion of “User Focused Security” acknowledges that attacks against corporate users (e.g., phishing, malware) are the primary information security.
NEWARK — There have been times over the last two months when Golan Ben-Oni has felt like a voice in the wilderness. On April 29, someone hit his employer, IDT Corporation, with two cyberweapons that had been stolen from the National Security Agency. Mr.
Why won’t the password just go away? The silly pet names, movie titles or sports teams that many people punch in to get into their online accounts are a weak spot that hackers continue to puncture.
If you don’t already have two-step authentication enabled on your all your accounts, you really need to turn it on for anything sensitive. Here’s how.
SHARJAH KHALID PORT, United Arab Emirates — The man bobbing in the sea raises his arms in a seeming sign of surrender before he is shot in the head. He floats face down as his blood stains the blue water. A slow-motion slaughter unfolds over the next 6 minutes and 58 seconds.
What: Stop kidding yourself that you only re-use passwords on accounts that don’t matter, or that you have an unbreakable password scheme that no one else can guess. Every single thing with a password needs to have a unique password, shared with nothing else.
A few months ago I published an article on how to pick a lock. One of the reasons I showed folks how to do that (besides fulfilling a goal to become more like Jason Bourne) was to demonstrate how locks provide an “illusion of security.
No one likes getting hacked, and it’s generally true that the quicker you can spot something has gone awry, the better your chances of minimizing the damage. These are the main warning signs to look out for, what they might mean, and some quick pointers about what you should do next.
I was wondering recently after poring through yet another data breach how many people actually use multi-step verification.
Larson Studios president Rick Larson and his wife and business partner, Jill Larson, didn’t recognize the number that sent them these two short text messages via their personal cell phones two days before Christmas last year, so they simply ignored them.
WASHINGTON/MOSCOW (Reuters) - Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyber attacks on the West, a Reuters investigation has fo
The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.
Aaron Swartz once said, "It's no longer OK not to understand how the Internet works.
As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to take over the server directly and gain system SHELL privileges. <(￣︶￣)>
You recently published a story with the alarming headline “WhatsApp backdoor allows snooping on encrypted messages.” This story included the phrasing “security loophole”.
People who would never leave their front door unlocked can be dangerously lax about their online security. To be safe, follow these rules You’ll never have more ideas about how to protect your identity than the minute after you realise it’s been stolen.
I recently received an email from Netflix which nearly caused me to add my card details to someone else’s Netflix account. Here I show that this is a new kind of phishing scam which is enabled by an obscure feature of Gmail called “the dots don’t matter”.
REDMOND, Wash. — Microsoft was once the epitome of everything wrong with security in technology.
Many people will disagree with this post, not so much because it's flat out wrong but because there are so many different approaches one can take. It's a very subjective realm but I'm going to put forward some suggestions, make some considered arguments and leave it at that.
The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, including household names, and small Internet sites.
There seems to be a new data breach in the news every week — a major company hacked, millions of usernames, passwords or credit card numbers stolen. There isn’t much that you, as an individual, can do to stop hackers from stealing the data you entrust to companies.
Explain like I’m 5 years old: Kerberos – what is Kerberos, and why should I care? While this topic probably can not be explained to a 5 year-old and be understood, this is my attempt at defragmenting documentation with some visual aids and digestible language.
We're in the middle of an epic battle for power in cyberspace. On one side are the traditional, organized, institutional powers such as governments and large multinational corporations. On the other are the distributed and nimble: grassroots movements, dissident groups, hackers, and criminals.
Last year, on October 21, your digital video recorder — or at least a DVR like yours — knocked Twitter off the internet.
On a bright April morning in Menlo Park, California, I became an Internet spy. This was easier than it sounds because I had a willing target. I had partnered with National Public Radio (NPR) tech correspondent Steve Henn for an experiment in Internet surveillance.
What Errors Are Included in the Top 25 Software Errors? The Top 25 Software Errors are listed below in three categories: Click on the CWE ID in any of the listings and you will be directed to the relevant spot in the MITRE CWE site where you will find the following: Ranking of each Top 25 entry, L
I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering it as a career choice. First, know that there are many subspecialties in computer security.
By reporting on the agency's actions, the vulnerabilities in our computer systems can be fixed.
CHANTILLY, Va. — On a recent Wednesday morning, 100 intelligence analysts crammed into a nondescript conference room here and dialed into a group call with 100 counterparts in Argentina, Brazil, Cyprus, India, the Netherlands, Romania, Spain, Taiwan and Ukraine.
SAN FRANCISCO — A security loophole that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the broader risks that come with technology’s embedding into the nooks of our lives.