Google Login Security for High-Risk Users

Google has a new login service for high-risk users. it’s good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data from a mobile device will similarly require a Bluetooth dongle. All non-Google services … Continue reading Google Login Security for High-Risk Users

Google Login Security for High-Risk Users

Google has a new login service for high-risk users. It’s good, but unforgiving. Logging in from a desktop will require a special USB key, while accessing your data from a mobile device will similarly require a Bluetooth dongle. All non-Google services and apps will be exiled from reaching into your Gmail or Google Drive. Google’s malware scanners will use a… Continue reading Google Login Security for High-Risk Users

Eight Myths Not to Believe About Penetration Testing

Penetration testing can help organizations across all industries identify vulnerabilities before cybercriminals have a chance to exploit them.

The post Eight Myths Not to Believe About Penetration Testing appeared first on Security Intelligence.

Continue reading Eight Myths Not to Believe About Penetration Testing

Digital Security Exchange: Security for High-Risk Communities

I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements like "use Tor" — all offered in good faith and with the best of intentions — can be hard to understand or act upon. If we want to truly secure civil society… Continue reading Digital Security Exchange: Security for High-Risk Communities

Security News – Paul’s Security Weekly #503

The risks of using an Android password manager, another WordPress plugin is flawed, hidden backdoors, Cloudbleed gets triggered, and more in this week’s security news! Full Show Notes Subscribe to YouTube Channel Security Weekly Website Follow us on Twitter: @securityweekly http://traffic.libsyn.com/pauldotcom/Pauls_Security_Weekly__503_-_Security_News_converted.mp3 Continue reading Security News – Paul’s Security Weekly #503

Buzzword Watch: Prosilience

Summer Fowler at CMU has invented a new word: prosilience: I propose that we build operationally PROSILIENT organizations. If operational resilience, as we like to say, is risk management "all grown up," then prosilience is resilience with consciousness of environment, self-awareness, and the capacity to evolve. It is not about being able to operate through disruption, it is about anticipating… Continue reading Buzzword Watch: Prosilience

How the Media Influences Our Fear of Terrorism

Good article that crunches the data and shows that the press’s coverage of terrorism is disproportional to its comparative risk. This isn’t new. I’ve written about it before, and wrote about it more generally when I wrote about the psychology of risk, fear, and security. Basically, the issue is the availability heuristic. We tend to infer the probability of something… Continue reading How the Media Influences Our Fear of Terrorism

Class Breaks

There’s a concept from computer security known as a class break. It’s a particular security vulnerability that breaks not just one system, but an entire class of systems. Examples might be a vulnerability in a particular operating system that allows an attacker to take remote control of every computer that runs on that system’s software. Or a vulnerability in Internet-enabled… Continue reading Class Breaks

Startup Security Weekly #19 – News

In this week’s news, we chat promising equity against issuing equity, why someone burned $10 million so you don’t have to, and ask the age-old question: are you taking enough risks? Tune in to this week’s Startup News! Full Show Notes Take the Security Weekly Survey Visit http://securityweekly.com/category/ssw/ for all the latest episodes! http://traffic.libsyn.com/sswaudio/Startup_Security_Weekly__19_-_News_converted.mp3 Continue reading Startup Security Weekly #19 – News