Identity theft and data breaches are less likely to occur in an environment without passwords. Image: Song_about_summer/Adobe Stock World Password Day will be recognized on May 5 this year –…
The COVID-19 gender gap: Addressing bias at work can help bring women back to the office
The global pandemic highlighted inequities at the workplace and the greater stresses women face. Here’s how a new tool that uses science to uncover bias at work can improve workplaces…
Even C-suite executives use terrible passwords like ‘123456’
Many high-level executives and business owners rely on weak and simple passwords, leaving their companies more vulnerable to data breaches, says NordPass. Image: jamdesign/Adobe Stock No matter how often we’re…
TA410: The 3-headed cyberespionage threat actor
Image: Sergey Nivens/Shutterstock New discoveries have been published by ESET about a cyberespionage threat actor dubbed TA410, active since at least 2018 and who targeted U.S. companies in the utilities…
Learn ethical hacking from a certified instructor with this affordable training
Work as a penetration tester or bug bounty hunter and kick off a new and exciting career. Image: Stack Commerce According to NCC’s March 2022 Cyber Threat Pulse report, cybercrime…
How hackers used smarts and a novel IoT botnet to plunder email for months
Enlarge It’s not the kind of security discovery that happens often. A previously unknown hacker group used a novel backdoor, top-notch trade craft, and software engineering to create an espionage…
Internal chats of ransomware cybercriminals reveal ways to avoid becoming a victim
Chats analyzed by Cisco Talos show how ransomware groups determine ransom amounts and force organizations to pay but also are willing to negotiate with victims. Image: jamdesign/Adobe Stock A report…
Wi-Fi May Be Coming Soon to a Lamppost Near You
NIST communications researchers traveled to downtown Boulder, Colorado, to verify their channel model for evaluating high-frequency wireless network designs. Sung Yun Jun is checking the alignment of the transmitter, mounted…
Adding Custom GitHub Badges to Your Repo
If you’ve spent time looking at open-source repos on GitHub, you’ve probably noticed that most of them use badges in their README files. Take the official React repository, for instance. There are GitHub badges all over the README file that communicate important dynamic info, like the latest released … Adding Custom GitHub Badges…
CyberArk vs BeyondTrust: Compare IAM solutions
It’s time to upgrade your IAM software, but which security tool should you choose? See how the features of CyberArk and BeyondTrust compare. Image: jijomathai/Adobe Stock Must-read security coverage Choosing…