Good Essay on the History of Bad Password Policies

Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but ...
Hacked Robot Vacuums Shouting Slurs & Secret Printer Tracking Dots!

Hacked Robot Vacuums, Secret Printer Tracking Dots

In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...

Unmasking the Hack-to-Trade Scheme: A Cautionary Tale for Executives

In a shocking revelation, federal prosecutors have charged UK national Robert B. Westbrook with orchestrating a sophisticated “hack-to-trade” scheme that netted him millions of dollars. By exploiting vulnerabilities in Office365, Westbrook allegedly ...

NIST Recommends Some Common-Sense Password Rules

NIST’s second draft of its “SP 800-63-4“—its digital identify guidelines—finally contains some really good rules about passwords: The following requirements apply to passwords: lVerifiers and CSPs SHALL require passwords to be a ...

Passwordless Authentication: Enhance UX, Bolster Security

The password’s days are numbered. Passwordless authentication is fast emerging as the password’s successor. Leveraging biometrics, hardware security keys, passkeys, and more, passwordless authentication technologies are a more secure alternative to the ...
Get a demo

Avoiding Credential Reuse: Minimizing the Risks of Targeted Cyberattacks

Cyber threats are a growing concern for individuals and businesses alike. One of the most common yet overlooked threats is credential reuse. Let’s take a look at the risks associated with credential ...

Compromising the Secure Boot Process

This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by Acer, Dell, Gigabyte, Intel, and Supermicro. The ...
Authy Breach Impact & RockYou 2024 Password Leak

Authy Breach: What It Means for You, RockYou 2024 Password Leak

In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that ...