In the spotlight

Today I submitted a talk to Black Hat, and they asked for a video sample of any previous conference presentations, and I recalled this talk that I gave at Real World Crypto 2017 in New York.I wish I spoke slower and with a better accent, but I'm happy that the…

In the spotlight

Today I submitted a talk to Black Hat, and they asked for a video sample of any previous conference presentations, and I recalled this talk that I gave at Real World Crypto 2017 in New York.I wish I spoke slower and with a better accent, but I'm happy that the…

Why I Always Tug on the ATM

Once you understand how easy and common it is for thieves to attach “skimming” devices to ATMs and other machines that accept debit and credit cards, it’s difficult not to closely inspect and even tug on the machines before using them. Several readers who are in the habit of doing just…

Post-FCC Privacy Rules, Should You VPN?

Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet service providers (ISPs) from sharing or selling customer browsing history, among other personal data. Some are concerned enough by this development that they’re looking at obfuscating all of their online…

Alleged vDOS Owners Poised to Stand Trial

Police in Israel are recommending that the state attorney’s office indict and prosecute two 18-year-olds suspected of operating vDOS, until recently the most popular attack service for knocking Web sites offline. On Sept. 8, 2016, KrebsOnSecurity published a story about the hacking of vDOS, a service that attracted tens of thousands of…

Phishing 101 at the School of Hard Knocks

A recent, massive spike in sophisticated and successful phishing attacks is prompting many universities to speed up timetables for deploying mandatory two-factor authentication (2FA) — requiring a one-time code in addition to a password — for access to student and faculty services online. This is the story of one university…
1 2 3 4