When it comes to online security, confusion about the risks can lead people to obsess over obscure threats while ignoring key innovations that could truly protect them. Even highly-targeted users like politicians and activists don’t fully appreciate the scourge of phishing, and many aren’t familiar with an emerging form of two-factor authentication known as “Security […]
They are weird in the way they write data, and even weirder in the way they delete information. In the good old days of striped magnetic recording, one could delete a file and rest assured its content was still there until overwritten at some (hopefully distant) moment in the future; not so on an SSD.
It’s no secret that computers are insecure. The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. Security is not a problem the market will solve. The government needs to step in and regulate this increasingly dangerous space. The primary reason computers […]
One Important Caveat As impressive as all of Guri’s work is, they all carry one critical assumption that limits their effectiveness. For all them, Guri assumes that someone can get physical access to the air-gapped computer, and be able to successfully install malware on it. That means most of your air gaps are safe. But […]
Slax developer Tomas Matejicek announced today the release and immediate availability of the Slax 9.5.0 release with the latest updates and security patches. With the Slax 9.5.0 release, which incorporates all the latest security patches and software updates from the Debian GNU/Linux 9.5 “Stretch” operating system, the developer also announced the availability of a USB flash drive pre-installed […]
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes. Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log […]