What a Phishing Attack Looks Like Up CLose

Credit to Author: Lily Hay Newman| Date: Mon, 03 Jul 2017 01:36:00 +0000
For five weeks, I let professional phishers attack my inbox. Here’s what I found out.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Mon, 03 Jul 2017 01:36:00 +0000
For five weeks, I let professional phishers attack my inbox. Here’s what I found out.
Read More
Credit to Author: Greg Allen| Date: Sat, 01 Jul 2017 16:00:00 +0000
Opinion: The world of truth is about to be upended by AI technologies.
Read More
Credit to Author: Lily Hay Newman| Date: Sat, 01 Jul 2017 14:00:00 +0000
Six months into the year, and everything’s already a mess.
Read More
Credit to Author: Andy Greenberg| Date: Sat, 01 Jul 2017 12:00:00 +0000
Petya ransomware, NSO malware, hacked wind farms, and more in this week’s top security news.
Read More
Credit to Author: Issie Lapowsky| Date: Fri, 30 Jun 2017 22:18:16 +0000
Trump’s commission to investigate voting fraud wants to make all your voter data public. Here is every reason why experts on both sides of the aisle think that’s a bad idea.
Read More
Credit to Author: Brian Barrett| Date: Fri, 30 Jun 2017 11:00:00 +0000
Any case for intelligence agencies to have special access to encryption moot.
Read MoreCredit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 30 Jun 2017 12:00:57 +0000
The late 70s/early 80s American television show Three’s Company was one of my favorite shows growing up. The central theme of the show revolved around the lives of three roommates. Each episode usually involved a misunderstanding, then chaos would ensue. In the end, everything would turn out okay. Unfortunately, this week’s episode of “ransomware in…

Credit to Author: Richard Hoffman| Date: Fri, 30 Jun 2017 03:01:00 -0700
Here’s an increasingly common scenario: You’re on a business trip, either entering a foreign country or returning home. As you go through customs, a border-control agent asks you to turn on and hand over your iPhone, then starts poking around, looking at your text messages, call logs and apps. The agent then asks you to wake your MacBook, log into your social media accounts and open your email. After the agent reads your tweets and posts for a few minutes, your phone and laptop are taken “for further inspection” — and returned some time later.
Alternatively, the equivalent of the Transportation Security Administration (TSA) in a foreign country declares that all laptops on international flights must be put in checked baggage — a scenario only narrowly averted a few weeks ago. Your company laptop is properly checked in, but when you arrive at your destination, you discover that not only has your bag been searched, but your laptop appears to have been opened and powered on.
To read this article in full or to leave a comment, please click here