720-891-1663

Open Source Maintainers Under Attack

There are folks who say that open source is safer than commercial software because, well, it is open source. Their theory is that since, technically, anyone can look at the source (ignoring the fact that you would need to be a trained programmer in whatever language that software is written in and have the time […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Mobile Malware Defeats Biometrics

Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending February 9, 2024

DEF CON is Canceled, No Really It is a meme. Every year there are announcements that DEF CON is canceled, but this year it is real. Sort of. DEF CON is the world’s largest hacking convention and has, for years, been held at Caesars in Las Vegas. You may remember that Caesars had an unfortunate […]

Continue reading → [DISPLAY_ACURAX_ICONS]

What IS a Software Bill of Materials Anyway?

The feds are pushing pretty hard to get software makers to create and manage Software Bills of Materials or SBoMs. What the heck is an an SBoM anyway and why is it important. A very non-technical comparison would be the list of ingredients in packaged food. Let’s say you are allergic to some food, say […]

Continue reading → [DISPLAY_ACURAX_ICONS]

25 Cyber Orgs Sign Secure by Design AI Agreement

While basically unenforceable, the agreement is a starting point. The US, UK and 23 domestic and international cybersecurity organizations, representing more than a dozen countries, signed on to the Guidelines for Secure AI Development. The Guidelines, complementing theĀ U.S. Voluntary Commitments on Ensuring Safe, Secure, and Trustworthy AI, provide essential recommendations for AI system development and […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending November 24, 2023

Post Quantum Crypto Isn’t The Only Problem – Pre Stone Age Crypto is Also a Problem While some folks are worried about what is going to happen to encryption when quantum computing becomes real, other companies are still using antique crypto. Unfortunately, many of the companies who are using antiques are medical devices and higher […]

Continue reading → [DISPLAY_ACURAX_ICONS]