More from Markus Jakobsson
- Pwner of a Lonely Heart: The Sad Reality of Romance Scams
- It Takes a Village: The Importance of Security Standards
- The Cumulative Effect of Major Breaches: The Collective Risk of Yahoo & Equifax
- The Challenge of Training AI to Detect Unique Threats
- Trouble in Paradise as Cyber Attackers Circumvent 2FA
- Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing
- Unspoofable Device Identity Using NAND Flash Memory
- Using Guilt Instead of Cryptography
Latest News
- Threat-Intelligence Startup VulnCheck Closes $8M Seed Financing
- In Other News: OSS Backdooring Attempts, Botnet Operator Charged, Automotive Firm Attack
- First Major Attempts to Regulate AI Face Headwinds From All Sides
- US Government Releases Guidance on Securing Election Infrastructure
- Akira Ransomware Made Over $42 Million in One Year: Agencies
- Frontier Communications Shuts Down Systems Following Cyberattack
- OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes Clusters for Cryptomining
- SAP Applications Increasingly in Attacker Crosshairs, Report Shows
Click to comment