Avivah Litan stories
Yahoo breach news is shocking but not surprising - what to do now?
Identity proofing is clearly a top global fraud issue. What can organisations who need to prove electronic identities do to overcome this issue?.
Have you met Delilah? The first Insider Threat Trojan
New Trojan, Delilah, recruits insiders through social engineering and extortion, using ransomware techniques. Insider threats set to increase.
Insider threats escalate and thrive in the Dark Web
Disgruntled employees are gladly selling their services to the bad guys in order to inflict harm on their employers.
Stop bullying Apple around and start doing some intelligence homework
The FBI should stop bullying Apple and the technology industry and spend their time and energy instead on figuring out other ways of investigating.
Why the Government needs to leave Apple and Google encryption alone
It doesn’t make any sense to put so much pressure on Apple or Google when in the end, they don’t control all the keys to the kingdom.
Attacks against IoT, Dark Web indexing, and other tales from Ground Zero
Attacks against IoT are not theoretical – they are real, and they will happen.