Does a smartphone make two-factor authentication?

Does a smartphone make two-factor authentication?

Is a cell phone a suitable second factor for two-factor authentication? Several infosec pros had a lively debate about this topic on Twitter recently.

03/17/2016

A positive step for insecure home routers

A positive step for insecure home routers

It's gratifying to see real results come out of my research. ASUSTeK has settled a case with the FTC involving the security state of its wireless routers, and among the terms is something I have been seeking for a couple of years:...

02/23/2016

Putting the Comcast vulnerability in context

Putting the Comcast vulnerability in context

Recent research showing that Comcast Xfinity home security systems can be abused to falsely report all is well during a break-in have flooded the news this week. Exploitable vulnerabilities are attention-grabbing, but need to be...

01/06/2016

Your child's privacy is eroding

Your child's privacy is eroding

Social media, cloud-based educational tools, and Internet-connected toys are eating away at your child's privacy. VTech recently was breached, affecting over 5 million parents and 6.4 million children. Privacy advocates see "Hello...

12/02/2015

Back to school cyber tips

Back to school cyber tips

Practical security suggestions that anyone can follow. None of these are earth-shattering - I and my fellow security professionals have recommended most of these for years, though the order of importance has changed a bit recently....

09/08/2015

Maybe a Cyber UL is just what we need

Maybe a Cyber UL is just what we need

For over 120 years, Underwriters Laboratories has given manufacturers and developers a trusted way to assure consumers that products are physically safe. Noted hacker "Mudge" is on a mission to do the same for connected products.

08/11/2015

Incident response lessons from the Texas flash flood

During the overnight hours of Saturday night and Sunday morning May 23-24, heavy rain in the Texas Hill Country triggered a flash flood of near-Biblical proportions in Wimberley and San Marcos. This is the story of a disaster response...

06/30/2015

How secure is your email?

How secure is your email?

Encrypted email has long been a complicated problem to solve, but a combination of Internet titans and innovative startups are working to make it practical for real people. Google has an "End-To-End" project developing a plugin for...

06/08/2015

Load More