
The scam on your doorstep
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Economics. Eschatology. Infosec.
135 articles
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Companies need to build a culture of security, but this is impossible when employees are afraid to discuss incidents or suggest improvements.
We dive into which corporate systems support passkeys, where compatibility falls short, and why we probably won’t be saying goodbye to passwords anytime soon.
Regulation and the evolving threat landscape are driving companies to adopt more resilient forms of employee authentication. Are passkeys a cost-effective and straightforward replacement for traditional passwords?
Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.
Wi-Fi sensing lets you monitor motion in your home – without cameras or motion sensors. We weigh the pros and cons of this increasingly popular technology.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
How cybercriminals can exploit your online store — and how to stop them.
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
This guide dives into using passkeys to sign in from someone else’s computer, storing them on a removable device, and transferring between devices.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
How to assess all the complexities of open-source application integration in advance, and choose the most efficient solutions.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
How organizations implement zero-trust principles, and what CISOs advise for project success.
Why highlighted links to visited sites can be dangerous, and why a solution was over 20 years in the making.
Popular AI code assistants try to call non-existent libraries. But what happens if attackers actually create them?