
An APT… through your webcam
How attackers can hijack your computer through its webcam — and how to stop it.
Economics. Eschatology. Infosec.
138 articles
How attackers can hijack your computer through its webcam — and how to stop it.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
Companies need to build a culture of security, but this is impossible when employees are afraid to discuss incidents or suggest improvements.
We dive into which corporate systems support passkeys, where compatibility falls short, and why we probably won’t be saying goodbye to passwords anytime soon.
Regulation and the evolving threat landscape are driving companies to adopt more resilient forms of employee authentication. Are passkeys a cost-effective and straightforward replacement for traditional passwords?
Causes of discrepancies in Common Vulnerability Scoring System ratings, common mistakes when using CVSS for vulnerability prioritization, and how to do this right.
Wi-Fi sensing lets you monitor motion in your home – without cameras or motion sensors. We weigh the pros and cons of this increasingly popular technology.
Why advanced attackers are interested in your home Wi-Fi access points, and how they maintain control over your devices.
Scammers have figured out how to send text messages that actually bypass cellular networks. How does illicit “SMS blasting” work, why does it matter for travelers, and how to stay safe.
How cybercriminals can exploit your online store — and how to stop them.
How integrated industrial cybersecurity solutions protect OT networks and reduce the cost of critical incidents.
This guide dives into using passkeys to sign in from someone else’s computer, storing them on a removable device, and transferring between devices.
Can you ditch passwords entirely for passkeys? We explore when it’s possible, and when it’s still a challenge.
How to assess all the complexities of open-source application integration in advance, and choose the most efficient solutions.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Can your photos be viewed, stolen, or deleted when your smartphone is plugged into a public charging station? As it turns out — yes!
Businesses reaching the “acceptance stage”: given inevitable breaches — how to prepare for them?
A year after its disastrous announcement, Microsoft is finally launching its AI-powered Recall feature on Copilot+ PCs. Is the new version secure, and what’s actually changed?
How organizations implement zero-trust principles, and what CISOs advise for project success.