Weekend Reads 080621

M of N is how you carve up ownership of necessary information to use a cryptographic hardware security module (HSM) to ensure a process that is visible to the community.

Last November, the European Council published the resolution “Security through encryption and security despite encryption.” It stated that law enforcement “must be able to access data in a lawful and targeted manner,” and called on stakeholders to find “technical solutions” to provide law enforcement access to end-to-end encrypted communications.

Intel’s Data Center Group has just turned in the third best revenue quarter in its history, just behind the two thirteen-week periods that started off 2020, which was before the coronavirus pandemic had hit and just after it hit and the full effects were not seen as yet.

Logos play a significant role in whether or not we open an email and how we assess the importance of each message.

The unpleasant truth of the matter is that this will certainly not be the last time society is disrupted due to attackers targeting critical industrial control systems (ICS). The impact of such an attack is amplified by the growing reliance on automation and antiquated protocols throughout many OT networks.

Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals.

The fewer applications you’ve got on your laptop, the better—it means more room for the apps you actually use, less of a strain on your computer, and fewer potential security holes to worry about.

For at least a decade, privacy advocates dreamed of a universal, legally enforceable “do not track” setting. Now, at least in the most populous state in the US, that dream has become a reality. So why isn’t Apple—a company that increasingly uses privacy as a selling point—helping its customers take advantage of it?

Open source packages downloaded an estimated 30,000 times from the PyPI open source repository contained malicious code that surreptitiously stole credit card data and login credentials and injected malicious code on infected machines, researchers said on Thursday.

Forget the home office — 45% of American teleworkers regularly work from a couch, 38% regularly work from bed and 20% often work outside, according to a study by the home improvement marketing firm CraftJack.

All across the United States, the leaders at large tech companies like Apple, Google, and Facebook are engaged in a delicate dance with thousands of employees who have recently become convinced that physically commuting to an office every day is an empty and unacceptable demand from their employers.

A tractor. A refrigerator. A smartphone. A ventilator. They may not seem to have much in common, but in fact they all share increasingly high tech features. And when they break, they need fixing.

The main issue with Bitcoin is with its wallet, where your Bitcoin is stored. Cryptocurrency wallets are generally pseudonymous rather than anonymous.

The short version: It’s an upgrade on the standard SMS/MMS texting standards that smartphones have been using from the beginning. It brings better support for all the cool add-ons we’re used to in our messaging apps, like read receipts and images, and it adds some extra security layers too.

For enterprise users, it’s unsettling to constantly read that attackers have wiggled into our networks. Just recently, we found out that “80% of Microsoft email accounts used by employees in the four U.S. attorney offices in New York were breached,” according to the AP.