A quick Saturday digest of cybersecurity news articles from other sources.
How to use Google Bard: A comprehensive guide
This is a complete guide on how to use Google Bard. Learn how Google Bard can help you boost your productivity, creativity and more.
ChatGPT vs Google Bard (2023): An in-depth comparison
This is an in-depth comparison of ChatGPT vs Google Bard. Use our guide to learn more about their unique capabilities and differences.
How Generative AI Will Remake Cybersecurity
Microsoft recently announced its Security Copilot service. The software giant built the technology on cutting-edge generative AI – such as large language models (LLMs) – that power applications like ChatGPT.
1Password enables passkeys — a new option from passwords
Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords and toward their low-friction replacement: passkeys.
On June 6, 1Password will take a big step away from passwords by allowing customers to save and sign into online accounts with passkeys via the 1Password browser extension. The extension puts 1Password instances in the log-in fields. It allows users both which enables customers to use vault-linked biometrics to sign into accounts.
In July 2023, the company will go further, releasing a beta that lets users sign into their 1Password vaults with a public/private encrypted passkey.
Researchers claim Windows “backdoor” affects hundreds of Gigabyte motherboards
It’s a backdoor, Jim, but not as we know it… here’s a sober look at this issue.
Free Windows XP
Green hills forever: Windows XP activation algorithm cracked after 21 years. Please, please, please do not actually install XP and use it. But if you must…
Serious Security: That KeePass “master password crack”, and what we can learn from it
Here, in an admittedly discursive nutshell, is the fascinating story of CVE-2023-32784. (Short version: Don’t panic.)
Serious Security: Verification is vital – examining an OAUTH login bug
What good is a popup asking for your approval if an attacker can bypass it simply by suppressing it?
Share
JUN
About the Author:
I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com