Skip to content

Password Sentry :: Security Blog

Blogging About Web Security

Security flaws in Microsoft email software raise questions over Australia’s cybersecurity approach

Last Updated on 16 October 2022 by Daniel

Shutterstock

Carsten Rudolph, Monash University

On March 2, 2021, Microsoft published information about four critical vulnerabilities in its widely used Exchange email server software that are being actively exploited. It also …

Published 16 October 2022
Categorised as Online Security

Facebook data breach: what happened and why it’s hard to know if your data was leaked

Last Updated on 15 October 2022 by Daniel

Alon Gal/Twitter

Paul Haskell-Dowland, Edith Cowan University

Over the long weekend reports emerged of an alleged data breach, impacting half a billion Facebook users from 106 countries.

And while this figure …

Published 15 October 2022
Categorised as Online Security

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Last Updated on 14 October 2022 by Daniel

The FBI’s latest cybersecurity moves bring the government into new territory – inside privately owned computers. AP Photo/Cliff Owen

Scott Shackelford, Indiana University

The FBI has the authority right now to …

Published 14 October 2022
Categorised as Online Security

Four ways to make sure your passwords are safe and easy to remember

Last Updated on 13 October 2022 by Daniel

Many still make their passwords too simple. Shutterstock/Vitalii Vodolazskyi

Steven Furnell, University of Nottingham

For more than 15 years, there have been various predictions from tech leaders about the death of …

Published 13 October 2022
Categorised as Online Security

Boris Johnson’s phone: what can hackers do with your mobile number?

Last Updated on 12 October 2022 by Daniel

Edward Apeh, Bournemouth University

Boris Johnson’s personal phone number has been publicly available on the internet for 15 years, it has been revealed. Listed at the bottom of a 2006 …

Published 12 October 2022
Categorised as Online Security

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Last Updated on 11 October 2022 by Daniel

Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

Terry Thompson, Johns Hopkins University…

Published 11 October 2022
Categorised as Online Security

Here’s how much your personal information is worth to cybercriminals – and what they do with it

Last Updated on 10 October 2022 by Daniel

The black market for stolen personal information motivates most data breaches. aleksey-martynyuk/iStock via Getty Images

Ravi Sen, Texas A&M University

Data breaches have become common, and billions of records are stolen …

Published 10 October 2022
Categorised as Online Security

ACIC thinks there are no legitimate uses of encryption. They’re wrong, and here’s why it matters

Last Updated on 9 October 2022 by Daniel

Gernot Heiser, UNSW Sydney; Lyria Bennett Moses, UNSW Sydney, and Vanessa Teague, Australian National University

Australia’s parliament is considering legislation to give new powers to the Australian …

Published 9 October 2022
Categorised as Online Security

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has

Last Updated on 8 October 2022 by Daniel

For cybersecurity, your best bet is to assume that the enemy has already slipped inside. clu/DigitalVision Vectors via Getty Images

Scott Shackelford, Indiana University

President Joe Biden’s cybersecurity executive order, …

Published 8 October 2022
Categorised as Online Security

A Chinese hacking competition may have given Beijing new ways to spy on the Uyghurs

Last Updated on 7 October 2022 by Daniel

Herr Loeffler/Shutterstock

Chaminda Hewage, Cardiff Metropolitan University and Elochukwu Ukwandu, Cardiff Metropolitan University

When Apple announced in a 2019 blog post that it had patched a security vulnerability in its …

Published 7 October 2022
Categorised as Online Security

Posts navigation

Newer posts Page 1 … Page 25 … Page 36 Older posts

Recent Posts

  • What is Cross-Site Scripting (XSS), and How to Prevent
  • Types of Hackers
  • How Do Hackers Hide Their IP?
  • How do Hackers Guess Passwords?
  • The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner

Recent Comments

  • Password Sentry Update – Password Sentry :: Security Blog on Revolutionary update coming to Password Sentry
  • SSH Security – Password Sentry :: Security Blog on FTP Security
May 2023
S M T W T F S
 123456
78910111213
14151617181920
21222324252627
28293031  
Apr    
Password Sentry :: Security Blog
Proudly powered by WordPress.