A good password manager is the first step to online security but not the last. Enabling multi-factor authentication on your accounts is the next step, and using a physical security key is the most secure way to do so. The Yubico YubiKey 5 Series has the best combination of compatibility, usability, and security of any key we tested.
Zoom, the video conferencing service whose use has spiked amid the Covid-19 pandemic, claims to implement end-to-end encryption, widely understood as the most private form of internet communication, protecting conversations from all outside parties. In fact, Zoom is using its own definition of the term, one that lets Zoom itself access unencrypted video and audio from meetings. Co-written with Micah Lee.
An audit report of Voatz platform confirms numerous issues previously discovered, and the voting app declines to make all the necessary changes.
This demanded a cross-industry summit—so now medical, security pros attend CyberMed.
The company is fighting back against rumors that it would scan messages on users’ phones prior to encryption.
We don’t really know—and that’s worrisome.
How police in the Valley use automated license plate readers
British and Canadian Governments Accidentally Exposed Passwords and Security Plans to the Entire Internet
On Trello, a project management site, the governments posted credentials for servers and domain names and even some emails and code.
One board member described the police's justification for the raids as a "tenuous" link between the privacy group, a blog, and its email address.
With so many lives at stake, computer scientists and healthcare IT pros are motivated to develop strategies that keep patients safe from medical device hackers. They’re making progress.
As Twitter ramps up its efforts against fake accounts, researchers are devising algorithms to distinguish humans from bots in their spare time.