The aftermath of the Twitter epilepsy attack

Credit to Author: Alex Perekalin| Date: Mon, 06 Jan 2020 16:45:45 +0000
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Alex Perekalin| Date: Mon, 06 Jan 2020 16:45:45 +0000
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Read More
Credit to Author: Nikolay Pankov| Date: Sat, 04 Jan 2020 11:19:06 +0000
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Read More
Credit to Author: Alexey Malanov| Date: Tue, 24 Dec 2019 20:30:19 +0000
Exploring front-running to capture the Gemini dollar’s antispam stake.
Read More
Credit to Author: Nikolay Pankov| Date: Fri, 20 Dec 2019 15:06:14 +0000
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Read More
Credit to Author: Sergey Golubev| Date: Thu, 19 Dec 2019 14:07:45 +0000
How paranoid employers and jealous partners can spy on you, and why chip bags are best left to movie heroes.
Read More
Credit to Author: Jeffrey Esposito| Date: Wed, 18 Dec 2019 16:34:14 +0000
On this podcast, Dave and Jeff address a ransomware attack in New Orleans, Facebook data stolen from a car, favorite Christmas movies, and more.
Read More
Credit to Author: Maria Vergelis| Date: Mon, 16 Dec 2019 12:12:30 +0000
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
Read More
Credit to Author: Nikolay Pankov| Date: Thu, 12 Dec 2019 19:34:29 +0000
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
Read More