- Authentication The Reports of Passwords' Demise Have Been Greatly Exaggerated
Passwords remain ubiquitous, but how we use them is changing. Biometric authentication lets people enter passwords less frequently, password vaults make complex credentials practical, and two-factor...
- Communication How to Become a Better Technical Writer
An unread report, a misunderstood email, or an ignored recommendation can undo days of strong technical work. Better technical writing is a learnable skill, sharpened through writing courses,...
- Privacy Security of Third-Party Keyboard Apps on Mobile Devices
Third-party mobile keyboards with network access can capture keystrokes and transmit them to developers' servers, creating keylogger-like risks. Keyboard developers vary widely in their security...
- Communication Tips for Troubleshooting Human Communications
Effective communication requires empathy, acknowledging different perspectives, and phrasing arguments using the other person's terminology and objectives. Key tips cover email best practices,...
- Encryption Confusing the Padlock and the Favicon in the Web Browser
Attackers can display padlock-shaped favicons to fool users into thinking non-HTTPS connections are secure. Chrome and Firefox addressed this by removing favicons from the URL bar, while Internet...
- Malware Analysis What to Include in a Malware Analysis Report
A malware analysis report should cover identification details (hashes, AV names), specimen characteristics and dependencies, behavioral and code analysis findings, supporting figures, and indicators...