More from Markus Jakobsson
- Pwner of a Lonely Heart: The Sad Reality of Romance Scams
- It Takes a Village: The Importance of Security Standards
- The Cumulative Effect of Major Breaches: The Collective Risk of Yahoo & Equifax
- The Challenge of Training AI to Detect Unique Threats
- Trouble in Paradise as Cyber Attackers Circumvent 2FA
- Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing
- Unspoofable Device Identity Using NAND Flash Memory
- Using Guilt Instead of Cryptography
Latest News
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
- CISA, NSA Issue Guidance for IAM Administrators

Click to comment