Valentine’s Day is a special holiday, but for victims of romance scams it is a tragic reminder, not only of love lost, but financial...
Hi, what are you looking for?
Valentine’s Day is a special holiday, but for victims of romance scams it is a tragic reminder, not only of love lost, but financial...
The Greatest Challenge that DMARC Adoption Faces is That Many Do Not Know That it Exists
Until quite recently, people believed that a dizzying one billion accounts were compromised in the 2013 Yahoo! breach… and then it was revealed that...
In a previous column, I discussed how traditional endpoint security fails because it focuses on detecting known bad instances. As evidenced by the rapid...
Two-Factor Authentication (2FA) has for years been one of the very dependable security technologies that was invoked to address high-risk scenarios -- whether to...
Theory of Unspoofable Device Identification Using NAND Flash MemoryMarkus Jakobsson and Karl-Anders Johansson
Theory on Using Guilt Instead of Cryptography to Prevent "Friendly Fraud"
Markus Jakobsson and Kim-Kwang Raymond Choo
When a new disease surfaces among humans or animals, the first thing we notice are the patterns of spread – not the structure of...
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be...