It’s been several years since the Indian government has caught my attention by peddling a suspicious phone app, but they […]


It’s been several years since the Indian government has caught my attention by peddling a suspicious phone app, but they […]
Via The Register: Google will extend developer verification to all Android apps, not just those installed from the Play Store, […]
Well, this happened at Google recently: Unlike direct prompt injections, where an attacker directly inputs malicious commands into a prompt, […]
Those of you who pay attention to infosec news at all will have heard about Tea, a women-only chat app […]
Here’s what CVE is, via The Register: The 25-year-old CVE program plays a huge role in vulnerability management. It is […]

My last Nintendo console was a NES, so I know very little about Nintendo’s more recent offerings (other than what […]
I have now seen an article about WebAuthn, the latest attempt by techies to replace the password. Previous attempts have […]
I was whittling down my backlog of Twitter likes the other day, and I clicked a link to Malawi24. Most […]
The story: A malware campaign discovered by researchers for Kaspersky Lab this month was in fact a US military operation, […]