Cybersecurity

Some locks are picked too easily

“As an engineer I’ve always laughed when actors bypass locks like that in movies. I never imagined anybody could design something that wrong.” Here is a collection of videos from LockPickingLawyer that show clearly how bad many locks are: [1045] Swiss Army Knife Bypass of Keypad Lock [1064] First No Touch Open! (Retekess Keypad) [1060]

New Armv9 CPU core

ARM processors touch 70% of the global population. From the edge to the cloud, Arm is on track to touch 100 percent of the world’s shared data. Arm has announced Armv9, its first new ARM architecture in a decade. Arm’s solution to the future needs of AI, security and specialized computing is v9 released at

Cyber security trends for 2021

Nothing is more difficult than making predictions. For this reason I did not do any “predictions for 2021 cyber security” posting before year 2021 started. Instead of trowing out wild ideas what might be coming, I have collected here some trends other people have predicted or reported. The State of internet security in 2020 was

Cyber security news December 2020

This posting is here to collect cyber security news December 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Cyber Security News November 2020

This posting is here to collect cyber security news November 2020. I post links to security vulnerability news with short descriptions to comments section of this article. If you are interested in cyber security trends, read my Cyber security trends 2020 posting. You are also free to post related links to comments.

Know how to decode a data breach notice

Data breach notifications have become an all-too-regular exercise in crisis communications that increasingly try to deflect blame, obfuscate important details and omit important facts. The next time you get a data breach notification, read between the lines. For instructions how to do that read How to decode a data breach notice article at https://tcrn.ch/2WMqUjm. Know