Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


2-15 – ENIAC was formally dedicated at the University of Pennsylvania on February 15, 1946 and was heralded as a “Giant Brain” by the press.


Verify Your Valentine

Original release date: February 11, 2021

This Valentine’s Day, before you go looking for love in all the wrong chat rooms, CISA reminds users to be wary of internet romance ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Apple critical patches fix in-the-wild iPhone exploits – update now!

Apple says. “Additional details available soon”, which you can translate as “this one took us by surprise”. So patch now!


Bruce Schneier sends out a summary of his monthly post in an email called Crypto-Gram.  Most of these articles are from his blog.


On ...

Continue Reading →
0

Guest Post – New Android Ransomware Exploit

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what you can do to keep your device safe.

There’s a new troublemaker in town. Its name is AndroidOS/MalLocker.B.

MalLocker.B is the youngest but shrewdest member of a ransomware family that has a long ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Robotic ‘Monster Wolf’ Protects Japanese Town From Bears

No bear interactions have been recorded in the town since the robots’ installation in September


Don’t let identity thieves take you for a ride

Read a real story of someone who forgot to lock his car one night. A thief took advantage ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


US Department of Justice reignites the Battle to Break Encryption

Every 5 to 10 years, the government and law enforcement agencies try to pass a law that provides easy access or a “back door” to encryption keys because criminals use encryption and this makes arrest and prosecution harder.  The problem is that anything that weakens encryption for criminals weakens ...

Continue Reading →
0

Security and Medical Devices

Are you using an implantable medical device such as a pacemaker, defibrillator, or infusion pump?  These devices are not as secure as you might expect.  October is Cybersecurity Awareness Month, and this week’s theme is “Securing Internet connected devices in health care.”   Parts of this article appeared previously in posts from January 16, 2016 and April 11 2016.  We have come ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA Releases Telework Essentials Toolkit

Original release date: September 30, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers. Each module outlines distinctive security considerations appropriate for their ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Who is Tech Investor John Bernard?

John Bernard, the subject of a story here last week about a self-proclaimed millionaire investor who has bilked countless tech startups, appears to be a pseudonym for John Clifton Davies, a U.K. man who absconded from justice before being convicted on multiple counts of fraud in ...

Continue Reading →
0
Page 1 of 9 12345...»