New Data Reveals Yahoo's Post-Breach Failings
For example Flame, a family of malware used for targeted espionage by nation states, relied on an MD5 vulnerability. All of the MD5 certificates in use by Yahoo! today and many of the other certificates Venafi Labs evaluated are self-issued. One …
Senators Demand Timeline of Yahoo's Handling of Massive Data Breach
In a letter to Yahoo CEO Marissa Mayer today, six Democratic senators have asked the tech company to provide further details of a massive data breach the company revealed last week, including when exactly the company became aware of it. Since the hack …
Will Yahoo's Data Breach Help Overhaul Online Security?
Yahoo Data Breach Could Extend Much Farther
Yahoo Facing Lawsuits, Senate Inquiry, Possibly Merger Issues After Massive Data Breach
What a real cyber war would look like
SAN FRANCISCO – Both U.S. presidential candidates have vowed to take on the world when it comes to cyber warfare. But full-scale cyber retaliation might be hard to spot and even harder to count as a win. "Unlike a traditional war, there is no end where …
Cyber Warfare to Be One of Next US President's Biggest Challenges – Clinton
Cyber history made at the first debate
Neither Trump Nor Clinton Know a Damned Thing About Cybersecurity, and Yes, You Should Be Concerned
Over the years I’ve done a number of—let’s just call them “experiments in computering”—where I attempt to use my computers in such a way that is outside of my comfort zone.
I typically give myself the simple goal of “do it for 30 days, and see how it goes.” In the process, I always learn something—about what I like, about what is possible. And even if I don’t learn a cotton-pickin’ thing of value, it’s still kinda fun—kinda.