Trojan horse scanner pitch is a sneaky worm
Trojan horse scanner pitch is a sneaky worm
You know, even when it’s a pitch for a trojan scanner, why would anyone install something that was sent to them unsolicited?
Follow these topics: Tech
Yeah so this is maybe something to keep in mind: Last year security researchers told TechCrunch that malicious users could access and listen in to Zoom and Webex video meetings by cycling through different permutations of meeting IDs in bulk. The researchers said the flaw worked because many meetings were not protected by a passcode. Lawyers,…
This is a fairly simple way to protect yourself. “If you save a login for a website like Chase.com or Amazon.com, your password manager will remember it and offer to automatically fill it in for you when you’re on Chase.com or Amazon.com. If you end up on a different website, your password manager won’t offer…
There’s been a world of attention paid to the Mailbox app for iPhone and Gmail since it was announced. In fact, the wait list for access to the app is quite impressive. Recently, after nearly forgetting that I had even signed up for it, my turn finally came around and I was able to hook…
I’m sure by now that you’ve seen news, and hot takes on the data breach of Capital One. Many of the articles I’ve seen about it have been focused on the fact that they went from finding the breach on July 19, to an arrest on July 29, which is pretty amazing really. But, I’m…
“Making fun of the Internet of Things has become a sort of national pastime, made possible by a laundry list of companies jumping into the space without the remotest idea what they’re actually doing. When said companies aren’t busy promoting some of the dumbest ideas imaginable, they’re making it abundantly clear that the security of…
In preparation for being in DC next week, I’ve been reading some history. Namely, I’ve been reading Mr. Lincoln’s T-Mails: How Abraham Lincoln used the Telegraph to Win the Civil War. I found the premise interesting, in that the telegraph really changed the dynamics between the commander in chief, and his generals. Rather than having…
See a sample before subscribing here