
How identification, authentication, and authorization differ
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
61 articles
We use raccoons to explain how identification, authorization, and authentication differ, and why 2FA is necessary.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
It seems the only reason to buy a “smart” padlock is to make lock-pickers happy.
At RSAC 2019, a SANS Institute instructor talked about how DNS manipulations can be used to hijack a company’s IT infrastructure.
Researchers at RSAC 2019 reported on the current vulnerability landscape and built a model that helps with effective patching strategy.
Changing passwords regularly is outdated. Use strong and unique passwords that are easy to remember instead. Here’s how to make them.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
The personal data of 257,000 Facebook users, including private messages belonging to 81,000 of them, has leaked online. Hackers claim to have access to 120 million accounts.
Why SMS isn’t the best choice for two-factor authentication, and what alternative types of 2FA you should consider.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
When it comes to online accounts, voicemail is a major security hole. Here’s why.
World Cup 2018 is coming. If you’re going to Russia, you’ve gotta be prepared. Take our quiz and find out if you are ready!
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
If someone offers cryptocurrency for nothing, remember the only free cheese is in a mousetrap. Here’s what’s really going on.
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.