article thumbnail

Stop using your phone number to log in

Vox

Yet the burden is often on users to protect themselves from a security issue that was created for them by some of their favorite apps. Even things that those services might recommend as an added security measure — like text, SMS, or multi-factor authentication — can actually introduce more vulnerabilities.

article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

W illiam Lidster has been with AAA Washington since August of 2017, serving as the leader of its information security an d compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

Identity authentication startup Auth0, which raised a $120 million Series F round in July, added three new board members: • Former Hewlett Packard Enterprise Chief Sales and Marketing Officer Sue Barsamian. The 9-year old company provides security technology and analysts, with a focus on healthcare, financial and government organizations.

Groups 82
article thumbnail

ChatGPT could make bioterrorism horrifyingly easy

Vox

Over the course of 2001, Rauf used his scientific credentials to make headway toward acquiring anthrax. Existing security measures tend to focus on proscribed lists of dangerous organisms or screening for known threatening genetic sequences. This might require advancing ways for legitimate scientists to authenticate themselves online.

article thumbnail

The Sony Hack in Context

CTOvision

The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. In connection with these losses the recently retired Director of the National Security Agency has stated, "In fact, in my opinion, it''s the greatest transfer of wealth in history,".

article thumbnail

Goodbye, NAC. Hello, software-defined perimeter

Network World

Those of us who’ve been around security technology for a while will remember the prodigious rise of network access control (NAC) around 2006. The early 2000s produced a steady progression of internet worms, including Code Red (2001), Nimda (2001), SQL Slammer (2003), Blaster (2003), Bagel (2004), Sasser (2004), Zotob (2005), etc.

article thumbnail

The silent spreaders: How computer worms can sneak into your system undetected?

Dataconomy

However, in the context of computer security, the term “worm” is used to refer to a self-replicating malware program that spreads through a network, as described in the previous section. CodeRed: A worm that first appeared in 2001 and infected tens of thousands of servers running Microsoft’s IIS web server software.

System 36