More from Markus Jakobsson
- Pwner of a Lonely Heart: The Sad Reality of Romance Scams
- It Takes a Village: The Importance of Security Standards
- The Cumulative Effect of Major Breaches: The Collective Risk of Yahoo & Equifax
- The Challenge of Training AI to Detect Unique Threats
- Endpoint Protection: Spotting the Cyber Wolf in Sheep’s Clothing
- Unspoofable Device Identity Using NAND Flash Memory
- Using Guilt Instead of Cryptography
- Are Nigerian Scams From Nigeria?
Latest News
- 50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement
- Bootloader Vulnerability Impacts Over 100 Cisco Switches
- Chemonics International Data Breach Impacts 260,000 Individuals
- System Two Security Emerges From Stealth With Detection Engineering Solution
- White House Says at Least 8 US Telecom Firms, Dozens of Nations Impacted by China Hacking Campaign
- BT Investigating Hack After Ransomware Group Claims Theft of Sensitive Data
- Veeam Warns of Critical Vulnerability in Service Provider Console
- Spy v Spy: Russian APT Turla Caught Stealing From Pakistani APT
Click to comment