The Long Path out of the Vulnerability Disclosure Dark Ages

Credit to Author: Lily Hay Newman| Date: Fri, 28 Feb 2020 21:04:52 +0000
Letting a company know about flaws in their products has gotten easier since 2003—but not by much.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Fri, 28 Feb 2020 21:04:52 +0000
Letting a company know about flaws in their products has gotten easier since 2003—but not by much.
Read More
Credit to Author: Andy Greenberg| Date: Fri, 28 Feb 2020 17:12:00 +0000
Dangerzone takes potentially malicious files and safely sanitizes them for you.
Read More
Credit to Author: Dan Goodin, Ars Technica| Date: Thu, 27 Feb 2020 15:00:00 +0000
Affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, and various Wi-Fi routers.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 26 Feb 2020 21:59:20 +0000
Security analyst John Strand had a contract to test a correctional facility’s defenses. He sent the best person for the job: his mother.
Read More
Credit to Author: Lily Hay Newman| Date: Tue, 25 Feb 2020 20:18:02 +0000
Users of Gmail get 300 billion attachments each week. To separate legitimate documents from harmful ones, Google turned to AI—and it’s working.
Read More
Credit to Author: Cecilia D’Anastasio| Date: Tue, 25 Feb 2020 13:00:00 +0000
With the highly anticipated *Animal Crossing: New Horizons* and E3 on the horizon, Nintendo has become “increasingly aggressive” combating leaks over the last couple of months.
Read More
Credit to Author: Lily Hay Newman| Date: Tue, 25 Feb 2020 12:00:00 +0000
Lazarus Group hackers have long plagued the internet—using at least one tool they picked up just by looking around online.
Read More
Credit to Author: David Nield| Date: Sun, 23 Feb 2020 12:00:00 +0000
Be generous, but also be careful.
Read More