
Coronavirus Sets the Stage for Hacking Mayhem
As more people work from home and anxiety mounts, expect cyberattacks of all sorts to take advantage.
Coronavirus Sets the Stage for Hacking Mayhem Read MoreComputer Security, CyberSecurity or Information Technology Security (IT Security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. CyberSecurity also refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.
As more people work from home and anxiety mounts, expect cyberattacks of all sorts to take advantage.
Coronavirus Sets the Stage for Hacking Mayhem Read MoreAn oral history of a devastating strike that hasn’t happened yet.
Imagine the US was just hit with a cyberattack. What happens next? Read MoreStudents of cybersecurity must be students of cyberattacks and adversarial behavior.
Engineering Trustworthy Systems: A Principled Approach to Cybersecurity Read MoreThe NIST NICE National Cybersecurity Workforce Framework is a nationally focused resource that establishes a taxonomy and common lexicon to describe cybersecurity work, and workers, regardless of where, or for whom, the work is performed. The NICE Framework is intended to be applied in the public, private, and academic sectors.
National Initiative for Cybersecurity Education Cybersecurity Workforce Framework Read MoreThe term we use for bad cryptography products is “snake oil,” which was the turn-of-the-century American term for quack medicine.
Bruce Schneier’s List of Snake Oil Warning Signs Read MoreA list of 100,000 passwords from Troy Hunt’s “Have I Been Pwned” data set. If you see a password that you use in this list you should change it immediately.
Passwords, passwords everywhere: How password blacklists can help your users to make sensible password choices Read MoreIs the increasing use of encryption an impediment in the fight against crime or an essential tool in the defense of personal privacy, intellectual property, and computer security?
Encryption and Surveillance Read MoreWe need to raise the awareness on a fundamental security technology [WPA2 Enterprise] that is very often deployed by violating its requirements, which creates important risks to users.
Enterprise Wi-Fi: We Need Devices That Are Secure by Default Read MoreThe technical resources largely exist to address the risk of a hyperconnected world, but the political, economic, and social impetus is lagging. “The fundamental problem is that companies are interested in getting products to market quickly. The market does not reward security,” Schneier says.
Deep Insecurities: The Internet of Things Shifts Technology Risk Read MoreProgress in [environmental protection, education, and global health research], however, is wholly dependent upon robust cybersecurity. Without a solid virtual foundation, the ability to move forward in any of these areas will always be held at risk.
The COVID Catalyst Read MoreFuzzing, or fuzz testing, is the process of finding security vulnerabilities in input-parsing code by repeatedly testing the parser with modified, or fuzzed, inputs. Fuzzing is commonly used as a shorthand for security testing because the vast majority of its applications is for finding security vulnerabilities.
Fuzzing: Hack, Art, and Science Read MoreCredit card fraudsters can use these doppelgängers [detailed fake user profiles] to attempt to evade the machine-learning-based anomaly-detecting antifraud measures upon which banks and payments service providers have come to rely.
Dark Web’s Doppelgängers Aim to Dupe Antifraud Systems Read MoreThe digital revolution has urgent and profound implications for our federal national security agencies. It is almost impossible to overstate the challenges. If anything, we run the risk of thinking too conventionally about the future.
I Work for N.S.A. We Cannot Afford to Lose the Digital Revolution. Read MoreAmid widespread demonstrations over rising gasoline prices, Iranians began experiencing internet slowdowns over the past few days that became a near-total internet and mobile data blackout on Saturday. The government is apparently seeking to silence protesters and quell unrest. So how does a country like Iran switch off internet access to a population of more than 80 million? It’s not an easy thing to do.
How the Iranian Government Shut Off the Internet Read MoreThe boundaries of privacy are in dispute, and its future is in doubt. Citizens, politicians and business leaders are asking if societies are making the wisest tradeoffs. The Times is embarking on this monthslong project to explore the technology and where it’s taking us, and to convene debate about how it can best help realize human potential.
The Privacy Project Read MoreThe National Cyber Security Alliance’s (NCSA’s) CyberSecure My Business™ is a national program helping small and medium-sized businesses (SMBs) learn to be safer and more secure online.
CyberSecure My Business Read MoreFrom Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers Read MoreSecurity – Your daily briefing on security, freedom, and privacy in the WIRED world.
WIRED.com – Security Read MoreNews about Computer Security (Cybersecurity), including commentary and archival articles published in The New York Times.
The New York Times – Computer Security / Cybersecurity News Read MoreAdvice on how to stay safe with iOS, Android, MacOS, Windows, Your TV, and Routers.
How to Update All Your Gear (For Safety!) Read More