How hackers can make ‘virtually any person’ click on a dangerous link
http://www.zdnet.com/article/how-hackers-can-make-virtually-any-person-click-on-a-dangerous-link/ Humans are a weak link in security that can’t be properly fixed with training. →
http://www.zdnet.com/article/how-hackers-can-make-virtually-any-person-click-on-a-dangerous-link/ Humans are a weak link in security that can’t be properly fixed with training. →
http://nbr.com/2016/07/25/heres-what-your-personal-data-is-going-for-on-the-dark-web/#.V58SAWOXxwE.linkedin How much does your personal data cost in dark web market? →
http://mobile.eweek.com/security/black-hat-usa-and-defcon-finding-security-risks-in-all-the-things.html There is no such thing as security by obscurity – flaws will be revealed. →
https://www.wired.com/2016/07/meet-moxie-marlinspike-anarchist-bringing-encryption-us/ Designer of Signal app and encryption used by WhatsApp. →
http://www.darkreading.com/vulnerabilities—threats/kpmg-study-breaches-up-security-spending-down/d/d-id/1326415 →
http://www.zdnet.com/article/nist-blog-clarifies-sms-deprecation-in-wake-of-media-tailspin/ NIST wants two-factor-authentication to be widely used – but does not want SMS to be a factor in this. There are good reasons for both recommendations. →
https://www.hackread.com/whats-app-chat-encryption-myth/ WhatsApp uses end-to-end ancryption for message sending, but the app can leave even the deleted messages accessible. →
http://www.macworld.com/article/3088057/internet-of-things/what-s-being-done-to-improve-security-for-the-internet-of-things.html →
http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&utm_content=FaceBook GPS is very widely used and vulnerable to spoofing. This article gives introduction to GPS and what could be done against spoofing attempts. →
http://www.zdnet.com/article/windows-10-telemetry-secrets/ This article tells what kind of data Windows 10 collects and how. →