- Authentication Morse-Style Tap Codes for Mobile Authentication
The Coin app implemented a Morse-style tap code authentication requiring users to enter sequences of short and long taps instead of numeric PINs. While innovative, the unfamiliar mechanism proved...
- Tools First Look at Google's New Domain Registrar
Google Domains offers domain registration at $12 per year with private registration included at no extra cost—a feature that competitors typically charge for. The transfer process is straightforward,...
- Malware Internet Noise and Malicious Requests to a New Web Server
A new web server with no public content immediately receives scans for open proxies, probes from potentially infected systems, and searches for phpMyAdmin vulnerabilities. These requests represent...
- Career Tips for Getting the Right IT Job
Landing the right IT job requires advance preparation, strategic networking, and treating interviews as two-way conversations. Key practices include understanding the role's requirements, customizing...
- Social Engineering Attackers Rely on Social Engineering to Activate Macros in Malicious Documents
Malicious document authors persuade victims to enable macros by claiming the security warning indicates protected content or by providing detailed step-by-step instructions for changing macro...
- Malware Analysis Version 5 Release of the REMnux Linux Distro for Malware Analysis
REMnux v5 adds tools for examining browser malware, document files, encoded artifacts, network interactions, and Linux specimens. New additions include Thug honeyclient, AnalyzePDF, XORStrings,...