The Show Must Go On

It has been a long time since I last posted on this site. Truth be told it was broken for at least three years. Nothing quite like having some free time to catch up. Honestly, it has been somewhat refreshing getting back into technical work and updating code, researching topics that have been on the […]

The post The Show Must Go On appeared first on Liquidmatrix Security Digest.

March 25, 2024
Read More >>

The Perilous Void: Imagining a World without U.S. Nuclear Deterrence

The Conference on Disarmament for the United Nations met on March 18th, 2024. Sixty-five member states were in attendance, including nuclear powers such as China, France, India, Israel, Pakistan, Russia, the UK, and the US. This meeting highlights ongoing global efforts toward nuclear disarmament and the complexities of maintaining nuclear deterrence while still supporting disarmament. […]

The Perilous Void: Imagining a World without U.S. Nuclear Deterrence was originally published on Global Security Review.

March 25, 2024
Read More >>

How to Protect Your Financial Data During Tax Season

W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.

The post How to Protect Your Financial Data During Tax Season appeared first on McAfee Blog.

March 25, 2024
Read More >>

China had “persistent” access to U.S. critical infrastructure

China-backed hackers have had access to some major U.S. critical infrastructure for “at least five years,” according to an intelligence advisory released Wednesday. Why it matters: The hacking campaign laid out in the report marks a sharp escalation in China’s willingness to seize U.S. infrastructure — going beyond the typical effort to steal state secrets. The advisory provides the fullest picture […]

China had “persistent” access to U.S. critical infrastructure was originally published on Global Security Review.

March 25, 2024
Read More >>

Chinese Nationals Posing as Tourists Have Accessed US Military Bases and Other Sensitive Sites: Report

Chinese nationals, who sometimes posed as tourists, accessed U.S. military bases and other sensitive sites around 100 times in recent years, according to an exclusive report by The Wall Street Journal. The newspaper cited U.S. officials, who described the incidents as potential forms of espionage. Last year, the U.S. Department of Defense, FBI, and other agencies […]

Chinese Nationals Posing as Tourists Have Accessed US Military Bases and Other Sensitive Sites: Report was originally published on Global Security Review.

March 25, 2024
Read More >>

Efficient Security Principle (ESP)

One of the hardest things about being in information security is the
frustration.

The longer you’re in the field the more you’re exposed to ridiculously
insecure systems that nobody seems to want to fix. We know how to fix …

March 25, 2024
Read More >>