More from Markus Jakobsson
- Pwner of a Lonely Heart: The Sad Reality of Romance Scams
- It Takes a Village: The Importance of Security Standards
- The Cumulative Effect of Major Breaches: The Collective Risk of Yahoo & Equifax
- The Challenge of Training AI to Detect Unique Threats
- Trouble in Paradise as Cyber Attackers Circumvent 2FA
- Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing
- Unspoofable Device Identity Using NAND Flash Memory
- Using Guilt Instead of Cryptography
Latest News
- Pentagon Outlines Cybersecurity Strategy for Defense Industrial Base
- The Complexity and Need to Manage Mental Well-Being in the Security Team
- Energy Department Invests $15 Million in University Cybersecurity Centers
- Massachusetts Health Insurer Data Breach Impacts 2.8 Million
- 26 Security Issues Patched in TeamCity
- VP Harris Says US Agencies Must Show Their AI Tools Aren’t Harming People’s Safety or Rights
- Malware Upload Attack Hits PyPI Repository
- Splunk Patches Vulnerabilities in Enterprise Product
Click to comment