One of the biggest threats facing both large and small businesses alike goes by the moniker credential stuffing. In these attacks, the bad guys count on our reuse of passwords across two or more logins, and once they find a user name/passwo…
The human impulse to help another human in need is one of our best instincts. But it’s also one that attracts the worst of humanity. Unfortunately, scammers love to take advantage of our altruistic tendencies — and I recently received two m…
Edward Snowden and Pulitzer Prize-winning journalists Glenn Greenwald and Chris Hedges have recently come together in a video conference call moderated by Amy Goodman of Democracy Now. In the video, the group talks about the past eight year…
“We informed a very small number of customers that the SIM card assigned to a mobile number on their account may have been illegally reassigned or limited account information was viewed,” a T-Mobile spokesperson told BleepingComputer last w…
The term digital freedom contains enough ideas to keep an entire university busy for eternity. The ironic etymology of the English word “digital” is worth an amusing aside, by the way. Originally meaning the numbers 1-10 — those you could c…
A years-long research effort between computer scientists at Stony Brook University and private industry researchers have found more than 1,000 new and more sophisticated phishing automation toolkits across the globe. What’s interesting abou…
Let’s start by taking a minute to think about all of the things we use our phones for. If you’re like most people, your phone is probably connected at a minimum to your email, your social media accounts, your browser, your photos, and your …
The US Cyberspace Solarium Commission’s latest report, entitled Countering Disinformation in the US, is the latest analysis to come from this two-year-old bipartisan Congressional think tank. The report, which was released in December, take…
Part of the ongoing collaboration between Diffbot and Avast includes the ongoing research into privacy issues for consumers. As part of this research, we’ve become interested in how an individual’s privacy could vary throughout the world ba…
As defenders, one of the challenges today in cybersecurity detection is our ability to determine whether a multitude of observations on network communications, setting changes, website downloads, and so on represent malicious artifacts lead…