Black Friday, my friends, is coming. Like a looming storm of deals, it can feel stressful waiting for the impending holiday’s arrival to finally get the things you want and need on sale. But, good news: Plenty of sales are starting early, so you can start checking things off your shopping list. Why not check […]
Explore More
In the swarm of post-election chaos that threatens to upend the goals of countless communities, at least one group is holding steady: the right to repair advocates. With a second Trump presidency ascending in the US, experts have been furrowing their brows about what the incoming administration will mean for the tech industry. But the […]
Explore More
I have probably tested close to 100 cheap phones over the past 9 years, and I’ve never really had to worry about bringing a backup in case things go awry. Budget phones are usually sluggish but work well enough. But I almost immediately regretted not bringing a spare smartphone when I took the HMD Fusion […]
Explore More
The US Patent and Trademark Office banned the use of generative artificial intelligence for any purpose last year, citing security concerns with the technology as well as the propensity of some tools to exhibit “bias, unpredictability, and malicious behavior,” according to an April 2023 internal guidance memo obtained by WIRED through a public records request. […]
Explore More
Late last month, the US Treasury Department finalized new restrictions limiting what kinds of Chinese tech startups US venture capital firms can invest in for national security reasons. When they go into effect in January, the long-awaited measures will stop American VCs and other investors from pouring money into cutting-edge Chinese AI models. After president-elect […]
Explore More
CERT, CSIRT, CIRT and SOC are terms you’ll hear in the realm of incident response. In a nutshell, the first three are often used synonymously to describe teams focused on incident response, while the last typically has a broader cybersecurity and security scope. Still, terminology can be important. Inconsistent terminology can cause misunderstandings of what […]
Explore More
IoT endpoints have become prime targets for hackers. In fact, Forrester Research concluded in its “The State of IoT Security, 2023” report that IoT devices were the most reported target for external attacks; they were attacked more than either mobile devices or computers. That’s not so surprising, given the challenges with securing an IoT ecosystem. […]
Explore More
Risk assessments and threat modeling enable organizations to learn how exposed they are to a successful attack. Both approaches are important, but understanding the differences between risk assessments and threat modeling requires companies know what constitutes a risk and what constitutes a threat. And that requires a definition of vulnerability. A security vulnerability is some […]
Explore More
Smart contracts execute processes, transactions and other tasks when specific events, conditions and logic are met, depending on how they are programmed. Smart contracts are deployed on a blockchain, such as Ethereum or other distributed ledger infrastructure, where they listen for events and updates from cryptographically secure data feeds called oracles. These contracts often control […]
Explore More