What Is DNS Hijacking?
Credit to Author: Andy Greenberg| Date: Mon, 04 Sep 2017 11:00:00 +0000
A recent attack on WikiLeaks illustrates a vulnerability deep in the routing system of the internet itself.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Andy Greenberg| Date: Mon, 04 Sep 2017 11:00:00 +0000
A recent attack on WikiLeaks illustrates a vulnerability deep in the routing system of the internet itself.
Read More
Credit to Author: Lily Hay Newman| Date: Sun, 03 Sep 2017 19:41:12 +0000
The Hermit Kingdom conducted its most powerful underground test yet, stoking tensions in an already very strained situation.
Read More
Credit to Author: Lily Hay Newman| Date: Sun, 03 Sep 2017 14:00:00 +0000
After several missed deadlines, Trump’s cybersecurity executive order has gotten off to a slow start.
Read More
Credit to Author: Garrett M. Graff| Date: Sun, 03 Sep 2017 11:00:00 +0000
As the federal disaster agency dives into hurricane Harvey cleanup, its weird Cold War legacy remains hidden—and relevant.
Read More
Credit to Author: Lily Hay Newman| Date: Fri, 01 Sep 2017 16:40:12 +0000
The security improvements in Android Oreo will have impacts beyond this one release.
Read More
Credit to Author: John Brandon| Date: Thu, 31 Aug 2017 13:52:00 -0700
The term “improperly configured” is a real plague on the IT landscape.
It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.
Essential phone recently sent an email to customers asking for proof of identity. This request was a little odd in the first place — who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.
To read this article in full or to leave a comment, please click here
Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 01 Sep 2017 13:25:14 +0000
The only topic I can bring up this week is the devastation in Texas caused by Hurricane Harvey. Many cities have been completely destroyed and to add insult to injury, Harvey moved back to the Gulf of Mexico and made landfall again in Louisiana. Catastrophic flooding has left tens of thousands without their homes and…

Credit to Author: John Brandon| Date: Thu, 31 Aug 2017 13:52:00 -0700
The term “improperly configured” is a real plague on the IT landscape.
It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.
Essential phone recently sent out an email to customers asking for proof of identity. This request was a little odd in the first place–who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.
To read this article in full or to leave a comment, please click here