How Chrome and Safari can help you strengthen your passwords

How Chrome and Safari can help you strengthen your passwords

Post Views: 113 Reusing passwords across multiple accounts is a tempting way to ensure you won’t get locked out of your favorite platforms, but this is a dangerous tactic as far as your online security goes. If hackers gain access to one account, they can get into all others using the same password. Remember—your accounts…

The most transformative security innovations of 2021

The most transformative security innovations of 2021

Post Views: 127 Year two of the pandemic brought a new flood of security concerns—domestically, internationally, and, of course, digitally. But companies and researchers stepped up their game. The US military demonstrated its most comprehensive anti-drone technology to date in the New Mexico desert; the Los Angeles Fire Department put the first robot firefighting vehicle…

What to know about the latest cybersecurity bug in log4j

What to know about the latest cybersecurity bug in log4j

Post Views: 152 “We have added this vulnerability to our catalog of known exploited vulnerabilities, which compels federal civilian agencies — and signals to non-federal partners — to urgently patch or remediate this vulnerability,” CISA director Jen Easterly wrote in the statement. The bug pertains to something called log4j, and one way that software engineers…

10 browser extensions that will take your online security to the next level

10 browser extensions that will take your online security to the next level

Post Views: 225 Avast is one of the more well-known and well-respected security software developers out there, and this simple add-on will bring some peace of mind to your online travels. It ranks sites for safety using its database of known threats and bad actors, so you know you’re not being duped into a phishing…

Your guide to better online security in 2022

Your guide to better online security in 2022

Post Views: 129 To start, consider Signal, Telegram, or one of a handful of secure messaging apps—even iMessage conversations are end-to-end encrypted. We covered six excellent choices in early 2021 when WhatsApp announced it planned to share more user data with its parent company, Meta (formerly Facebook), and you should be able to find one…

How digital bounty hunters search for software bugs—and money

How digital bounty hunters search for software bugs—and money

Post Views: 135 Katie Moussouris, former hacker-for-hire and pioneer of Microsoft’s own bug bounty program, has had her concerns, not just about Hack the Pentagon, but about the ways the bug bounty field was changing. “They chose to start with a cash reward program right out of the gate, and that was against my advice,”…

Prancer Enterprise announces the release of Cloud Security Automation as Code (Susa) to the general public

Post Views: 79 Prancer Enterprise announces the release of the Cloud Security Automation as Code (Susa) framework to the general public. This Open Source framework helps organizations to deploy secure Infrastructure as Code (IaC) templates to the cloud. Prancer Cloud Security Automation as Code (Susa) offering is a cloud provisioning engine with built-in Static Code…