Google claims state actors are using Ukraine war as a phishing lure
What happens to your MIT digital presence after graduation
If you are graduating from MIT this month, congratulations! This also means it’s time to start preparing for life after commencement. “Offboarding” is the process of transitioning and closing out your digital presence at MIT. It is important that you d…
Former eBay Exec Pleads Guilty to Cyber Stalking
eBay’s former senior director of safety and security admits role in fetal pig harassment campaign
Former eBay Exec Pleads Guilty to Cyber Stalking
eBay’s former senior director of safety and security admits role in fetal pig harassment campaign
NortonLifeLock Willfully Infringed Malware Patents
Jury finds cybersecurity company violated Columbia University’s rights over two patents
Ransomware Attack Closes Michigan College
Cyber-attack forces Kellogg Community College to cancel classes at five campuses
Zero Trust and the Fallacy of Secure Networks
Talking about secure networks is like talking about safe pools. A pool is just a body of water, and if it has enough water to swim in, then it has more than enough water to drown in. A pool is inherently unsafe. We, therefore, take care in how we use a…
Mozilla: Lack of Security Protections in Mental-Health Apps Is ‘Creepy’
Popular apps to support people’s psychological and spiritual well-being can harm them by sharing their personal and sensitive data with third parties, among other privacy offenses.
Mental Health and Prayer Apps Fail the Privacy Test
Mozilla finds most are neither secure nor protect user privacy