More from Markus Jakobsson
- Pwner of a Lonely Heart: The Sad Reality of Romance Scams
- It Takes a Village: The Importance of Security Standards
- The Cumulative Effect of Major Breaches: The Collective Risk of Yahoo & Equifax
- The Challenge of Training AI to Detect Unique Threats
- Trouble in Paradise as Cyber Attackers Circumvent 2FA
- Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing
- Unspoofable Device Identity Using NAND Flash Memory
- Using Guilt Instead of Cryptography
Latest News
- Zafran Emerges From Stealth With Risk and Mitigation Platform, $30M in Funding
- Chinese Cyberspies Targeting ASEAN Entities
- Threat Indicators Show 2024 Is Already Promising to be Worse Than 2023
- US Offering $10 Million Reward for Information on Change Healthcare Hackers
- Details and Lessons Learned From the Ransomware Attack on the British Library
- CISA Moving Forward With Cyber Incident Reporting Rules Impacting 316,000 Entities
- Code Execution Flaws Haunt NVIDIA ChatRTX for Windows
- Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own
Click to comment