Authors: Sadia Afroz and Vibhor Sehgal.
On February 24, a conspiracy theory emerged that Russia attacked Ukraine to destroy a clandestine U.S. weapons program. This narrative, started by a QAnon follower on Twitter, quickly became one of the …
Earlier this month, Drummond Reed was one of the panelists at CoinDesk’s 2022 Consensus conference discussing “The Promise of Self-Sovereign Data and Web 3.0 Identity Solutions: Real or Mirage?” Reed, who heads Digital Trust Services for Avast…
At last week’s WWDC22, Apple introduced a new feature called Safety Check in iOS 16. The new feature is designed to protect people in abusive relationships, and you can think of it as a privacy kill switch. The goal here is to help users be ab…
At last week’s WWDC22, Apple introduced a new feature called Safety Check in iOS 16. The new feature is designed to protect people in abusive relationships, and you can think of it as a privacy kill switch. The goal here is to help users be ab…
By now, you probably know what a zero-day vulnerability is: In simple terms, it’s the discovery of software and hardware coding errors that can be exploited by attackers. Some of these errors are found by government researchers, intentionally …
By now, you probably know what a zero-day vulnerability is: In simple terms, it’s the discovery of software and hardware coding errors that can be exploited by attackers. Some of these errors are found by government researchers, intentionally …
In a joint Cybersecurity Advisory by the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN), the four U.S. agencies warned businesses about t…
According to a court complaint filed by the U.S. Department of Justice (DoJ), “While Twitter represented to users that it collected their telephone numbers and email addresses to secure their accounts, Twitter failed to disclose that it also u…
From one perspective, the global supply chains our industries have built all around the world are beautiful and impressive. Some are more elaborate than others, but they all act as long-distance assembly lines, each third party doing their par…
It’s time for the annual Verizon Data Breach Investigation Report (DBIR), a compendium of cybersecurity and malware trends that offers some of the best analyses in our field. It examines more than 5,000 data breaches collected from 80 partners…