Something You Are: Typing Cadence

What would it be like if you could identify yourself and authenticate your account by the way you type?  A Romanian company, TypingDNA, has created a Chrome extension that does just that.

I am a big advocate of two-factor authentication, but there are some problems.  One of the three types of authentication is biometrics, which is “something you are.”  NIST, in SP 800-63B states ...

Continue Reading →
0

Using Artificial Intelligence in Cybersecurity

The problem with cybersecurity it that an attacker only needs to exploit a single vulnerability, while a defender needs to protect everything.  Defense has evolved from perimeter defense, to defending all endpoints, to adding automated detection and prevention appliances, to universal threat management that looks at not just north/south traffic passing through the Internet gateway, but also east/west traffic across the LAN ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Second company claims it can unlock iPhone X

A tiny US company called Grayshift is reportedly quietly touting software it claims can unlock Apple’s flagship handsets, the iPhone X and 8.


How women are helping to ...

Continue Reading →
0

Why Do I Need a VPN?

Did you know that most traffic across the Internet travels in an unencrypted state.  And when you make an open wireless connection  in a coffee bar or other public location, the radio connection is unsecured and  unencrypted, too.  This traffic travels as plain text, and can be read by anyone with the skills to intercept the traffic and open the data packets.

We ...

Continue Reading →
1

USB Exploits Pose Security Threats

Often when I am writing about cybersecurity, the situation seems worse than ever.  But its not more dangerous than its ever been, it dangerous in ways that its never been.

A team of Israeli researchers have cataloged 29 different USB exploits and attacks.  These attacks can come disguised as a smartphone charger connection, or may come hidden on a USB thumb drive.  Plugging an ...

Continue Reading →
0

Spectre and Meltdown Chip Based Security Vulnerabilities – Where Are We Now?

In January we learned about a pair of cybersecurity vulnerabilities called Spectre and Meltdown.  Discovered last summer by different security researchers, these vulnerabilities are proving difficult to mitigate because the problem exists in the way central processing units (CPUs) have been designed and manufactured.  These processor cores are at the heart of all computer hardware, from PCs and servers, to ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Happy St Patrick’s Day

Saint Patrick’s Day, or the Feast of Saint Patrick  is a cultural and religious celebration held on 17 March, the traditional death date of Saint Patrick (c. AD 385–461), the foremost patron saint of Ireland.


Critical Flash update. Patch now!

Can ...

Continue Reading →
0

Google Chrome Now Blocks Annoying Ads

If you are “monetizing” your website using any of certain Google-banned advertising types, you will need to rethink your strategy and use approved advertising types only.  Otherwise you run the risk of the Wrath of Google, and will see your advertising revenue drop along with your page rank.

Starting in mid-February, the most recent version of Google’s Chrome web browser proactively blocks certain ...

Continue Reading →
0
Page 149 of 273 «...120130140147148149150151...»