So, who was it? I have an idea.
The fraudsters who tried to steal multiple presidential elections by psychologically targeting Americans via stolen Facebook data…
A rapid analysis to try and untangle a few things.
He says he was deployed to Iraq. We have no real reason to believe otherwise. But is the Governor of Florida lying about this photo?
Is the world of blockchain as intimidating as it sounds? Infosec consultant Jackie Singh interviewed Web3 security practitioners…
Chaos Actors have yet again rigging up a fresh scandal. Who’s interested?
Who platforms those indoctrinating America’s male youth to commit mass murder?
EXCLUSIVE: Felony Voter Fraud by Madison Cawthorn’s (Cousin. Employee. Boyfriend?) Just when you think there couldn’t possibly be another scandal… Madison Cawthorn, the Republican elected representative whose frequent inappropriate, illegal, and immoral behavior cause millions of Americans to shake their heads in disgust, is now embroiled in a
Putting the “hostile” in “hostile takeover”.
If you use Windows, the answer is increasingly “no.”
…and Apple is laundering their lies right through the App Store.
A tenured academic fights back against the theft of her team’s work.
Just a few unpublished notes from my last piece…
There will be bumps on the road to securing the burgeoning Web3 ecosystem. But the infosec community must rise to the challenge.
Web3 technology offers a chance to break free from past cybersecurity mistakes.
Yet another ostentatious display of privilege from someone who certainly won’t be cancelled for it.
The latest Facebook breach brings reinforcement of various lessons learned in the trenches by information security professionals. We now…
Spend on security solutions continues to rise. However, unnecessary complexity is the enemy of effective cybersecurity. Cybercrime is a pressing issue for most commercial enterprises and spend on security solutions continues to rise. However, unnecessary complexity is the enemy of effective cyberse