Security

  • Apple Aims to Replace Passwords for Good in iOS 16

    Compromised passwords have been the biggest digital security vulnerability since the dawn of computing. Now, Apple wants to do away with the concept altogether. Source: https://www.reviewgeek.com/124654/apple-aims-to-replace-passwords-for-good-in-ios-16/

  • VirusTotal Data Shows How Malware Distribution Leverages Legitimate Sites, Apps

    Google-owned malware analysis service VirusTotal has published a report showing how threat actors abuse trust to bypass defenses and deliver their malware. Source: https://www.securityweek.com/virustotal-data-shows-how-malware-distribution-leverages-legitimate-sites-apps

  • Cybrary Raises $25 Million to Tackle Cybersecurity Workforce Training

    Venture capital investors are doubling down on investments in Cybrary, betting another $25 million that the Maryland startup is on the right track with a technology platform to train the […]

  • Largest DDoS Attack Ever – 659.6 Million Packets Per Second

    In the past few weeks, an organization in Eastern Europe has been the victim of the biggest DDoS attack that the continent has ever experienced. During the past month, several […]

  • Website Security Tips

    XSS attacks are a common occurrence on the Internet, and there are several ways to avoid them. Parameterized queries can be used to prevent these attacks, and the input code […]

  • Can the Police Really Watch My Doorbell Camera?

    How and when the police can access your doorbell and security cameras is a hot topic in the news and certainly one of great concern for people who value their […]

  • Advisory: Be Alert for Mega Millions® Scams

    Increasingly aggressive scam operators fraudulently using the Mega Millions® name and logo are promising big prizes to people who receive official-looking emails or texts, or through random phone calls. Source: […]

  • Average American Accesses Suspicious Sites 6.5 Times a Day

    Data generated by OnePoll from April 28 to May 3 2022 on behalf of AT&T shows that the average person happens upon a suspicious online site or social media account […]

  • 9 tips to prevent phishing

    Phishing, in which an attacker sends a deceptive email tricks the recipient into giving up information or downloading a file, is a decades-old practice that still is responsible for innumerable […]

  • Why Developers Hate Changing Language Versions

    Progress powers technology forward. But progress also has a cost: by adding new capabilities and features, the developer community is constantly adjusting the building blocks. That includes the fundamental languages […]

Become a Patron!

Follow me on Twitter

[instagram-feed]

Member of The Internet Defense League

Enjoy this blog? Please spread the word :)

RSS
Follow by Email