Latest from Michael Kassner
Victims of phishing are 400 times more likely to be successfully hijacked compared to a random Google user, according to researchers. Find out the most effective ways to mitigate credential theft.
Vulnerabilities are not always disclosed to the public right away--for instance, that was the case with Meltdown and Spectre. In light of this knowledge, event logging might be the best defense.