Search form

Malicious Attachments Remain a Cybercriminal Threat Vector Favorite

Via @LindseyOD123 It's no time to let your guard down: Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses. Read full article Read more

Why Every Website Wants You to Accept Its Cookies

Via @EmilyStewartM If you’ve visited a new website over the past 18 months or so, you’ve probably seen it: a notification informing you the page is using cookies to track you and asking you to agree to let it happen. Wonder why? Read full article Read more

Stop Trying to Memorize Your Passwords

The odds are very good one or more of the passwords you've used at some point during your online life has been compromised. Passwords are occasionally highjacked en masse when hackers manage to breach security systems put in place to protect online... Read more

RIP Fernando “Corby” Corbató, Inventor of the Password

Via @matthewhughes MIT computer scientist Fernando “Corby” Corbató passed away at his home in Newton, Massachusetts. He was 93. Read full article Read more

Chrome to Block Unsecure Content from Loading on HTTPS Pages

Via @codyenglish Google announced plans to inform users of its Chrome browser when sites utilize insecure connections. Read full article Read more

Exercise caution with all money transfer requests

The number of ways thieves can steal from you on the Internet is many. But one of the most insidious — albeit clever — might be a request for an urgent money transfer you receive via email that seems to come from your manager or company's finance... Read more

2018 Has Been Open Season on Open Source Supply Chains

Via Tom Spring Increasingly threat actors are planting bad code in open-source repositories in the hopes to harvest the flaws late. Read full article Read more

7 Common Ways Sites Get Compromised

Via Ezequiel Bruni People who break into other systems are nothing if not predictable. There are a number of pretty common kinds of attacks that can be prevented largely through simple forethought and planning. Read full article Read more

hy Privacy Is The Internet’s Most User-Friendly Feature

Via Christian Stewart | @stewofkc Privacy policies protect companies legally. They tell consumers how the company collects, stores and uses their data. Unfortunately, these privacy policies aren’t negotiable — to use the service users have to agree... Read more

What's Not Included in Facebook's 'Download Your Data'

Via Nitasha Tiku | @nitashatiku Users can download and review a lot of information with the Facebook "Download Your Data" tool. But it hardly tells you everything Facebook knows about you. Read full article Read more