Skip to content

Password Sentry :: Security Blog

Blogging About Web Security

Passwords: security, vulnerability, constraints

Last Updated on 15 May 2023 by Daniel

How secure is your password? Avi Richards/Unsplash

Hervé Debar, Télécom SudParis – Institut Mines-Télécom

What is a password?

A password is a secret linked to an identity. It associates two elements, …

Published 15 May 2023
Categorised as Online Security

Internet of Things: when objects threaten national security

Last Updated on 14 May 2023 by Daniel

Poorly secured IoT devices could lead to attacks on national security. flickr/electroluxdesignlab, CC BY-NC

Tim Stevens, King’s College London

We all know personal devices can be hacked, but a whole …

Published 14 May 2023
Categorised as Online Security

Lessons from ‘Star Trek: Picard’ – a cybersecurity expert explains how a sci-fi series illuminates today’s threats

Richard Forno, University of Maryland, Baltimore County

Editor’s note: This article contains plot spoilers.

Society’s understanding of technology and cybersecurity often is based on simple stereotypes and sensational portrayals in the entertainment media. I’ve written about how certain scenarios …

Published 13 May 2023
Categorised as Online Security

It’s being called Russia’s most sophisticated cyber espionage tool. What is Snake, and why is it so dangerous?

Shutterstock AI

Greg Skulmoski, Bond University

Like most people I check my emails in the morning, wading through a combination of work requests, spam and news alerts peppering my inbox.

But yesterday brought something different and deeply disturbing. I …

Published 12 May 2023
Categorised as Online Security

Defending hospitals against life-threatening cyberattacks

Last Updated on 11 May 2023 by Daniel

Is this device safe for use in a hospital? Guitar photographer/Shutterstock.com

Mohammad S. Jalali, MIT Sloan School of Management

Like any large company, a modern hospital has hundreds – even thousands …

Published 11 May 2023
Categorised as Online Security

Fortnite is setting a dangerous security trend

Last Updated on 11 May 2023 by Daniel

Shutterstock

Jason R.C. Nurse, University of Kent

Cybercriminals have just been given yet another route to get malicious software (malware) onto your personal mobile devices. The hugely popular video game Fortnite …

Published 10 May 2023
Categorised as Online Security

What teenagers need to know about cybersecurity

Last Updated on 9 May 2023 by Daniel

Everyone’s using technology – but they’re not all as safe as they could be. Akhenaton Images/Shutterstock.com

Sanjay Goel, University at Albany, State University of New York

Now that school is back …

Published 9 May 2023
Categorised as Online Security

A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening

Last Updated on 8 May 2023 by Daniel

Shutterstock

Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University

It seems hardly a day goes by without another report of a cyber crime incident. With Medibank still …

Published 8 May 2023
Categorised as Online Security

Blockchains won’t fix internet voting security – and could make it worse

Last Updated on 7 May 2023 by Daniel

An e-ballot is less secure than one on paper. SvetaZi/Shutterstock.com

Ari Juels, Cornell University; Ittay Eyal, Technion – Israel Institute of Technology, and Oded Naor, Technion – …

Published 7 May 2023
Categorised as Online Security

Deterring China isn’t all about submarines. Australia’s ‘cyber offence’ might be its most potent weapon

Last Updated on 6 May 2023 by Daniel

Shutterstock

Greg Austin, University of Technology Sydney

Australia doesn’t need to wait ten or 20 years for its new submarines, or for long-range missiles, to project effective military power against China.…

Published 6 May 2023
Categorised as Online Security

Posts navigation

Newer posts Page 1 … Page 3 … Page 36 Older posts

Recent Posts

  • Types of Hackers
  • How Do Hackers Hide Their IP?
  • How do Hackers Guess Passwords?
  • The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner
  • Is Two-Factor Authentication (2FA) Fully Secure?

Recent Comments

  • Password Sentry Update – Password Sentry :: Security Blog on Revolutionary update coming to Password Sentry
  • SSH Security – Password Sentry :: Security Blog on FTP Security
May 2023
S M T W T F S
 123456
78910111213
14151617181920
21222324252627
28293031  
Apr    
Password Sentry :: Security Blog
Proudly powered by WordPress.