Search form

Google’s Next Big Chrome Update Will Rewrite the Rules of the Web

Via @mattburgess1 Google’s impending takedown of third-party cookies in Chrome is a big win for privacy. And Google. Read full article Read more

Yes, People Are Still Using '123456' and 'password' as Their Password

Via @AlishaEbrahimji Seriously. And it's seriously compromising. Comparing the most common passwords of 2020 to those of 2019, there's little to no difference — aka we haven't learned much. Read full article Read more

Zoom Impersonation Attacks Aim to Steal Credentials

Via @LindseyOD123 The Better Business Bureau warns of phishing messages with the Zoom logo that tell recipients they have a missed meeting or suspended account. Read full article Read more

Malicious Attachments Remain a Cybercriminal Threat Vector Favorite

Via @LindseyOD123 It's no time to let your guard down: Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses. Read full article Read more

Why Every Website Wants You to Accept Its Cookies

Via @EmilyStewartM If you’ve visited a new website over the past 18 months or so, you’ve probably seen it: a notification informing you the page is using cookies to track you and asking you to agree to let it happen. Wonder why? Read full article Read more

Stop Trying to Memorize Your Passwords

The odds are very good one or more of the passwords you've used at some point during your online life has been compromised. Passwords are occasionally highjacked en masse when hackers manage to breach security systems put in place to protect online... Read more

RIP Fernando “Corby” Corbató, Inventor of the Password

Via @matthewhughes MIT computer scientist Fernando “Corby” Corbató passed away at his home in Newton, Massachusetts. He was 93. Read full article Read more

Chrome to Block Unsecure Content from Loading on HTTPS Pages

Via @codyenglish Google announced plans to inform users of its Chrome browser when sites utilize insecure connections. Read full article Read more

Exercise caution with all money transfer requests

The number of ways thieves can steal from you on the Internet is many. But one of the most insidious — albeit clever — might be a request for an urgent money transfer you receive via email that seems to come from your manager or company's finance... Read more

2018 Has Been Open Season on Open Source Supply Chains

Via Tom Spring Increasingly threat actors are planting bad code in open-source repositories in the hopes to harvest the flaws late. Read full article Read more