Update on NIST’s Post-Quantum Cryptography Program

NIST has posted an update on their post-quantum cryptography program: After spending more than three years examining new approaches to encryption and data protection that could defeat an assault from a quantum computer, the National…

How to Craft and Nail Your Brand Voice

Your brand voice is your business’s personality. It’s the character you use as the front man to your operations—the person that makes your business feel like a tangible thing. And that’s why it’s a huge…

Smart Lock Vulnerability

Yet another Internet-connected door lock is insecure: Sold by retailers including Amazon, Walmart, and Home Depot, U-Tec's $139.99 UltraLoq is marketed as a "secure and versatile smart deadbolt that offers keyless entry via your Bluetooth-enabled…

Hacking a Power Supply

This hack targets the firmware on modern power supplies. (Yes, power supplies are also computers.) Normally, when a phone is connected to a power brick with support for fast charging, the phone and the power…

Loading

A Peek into the Fake Review Marketplace

A personal account of someone who was paid to buy products on Amazon and leave fake reviews. Fake reviews are one of the problems that everyone knows about, and no one knows what to do…

Friday Squid Blogging: New SQUID

There's a new SQUID: A new device that relies on flowing clouds of ultracold atoms promises potential tests of the intersection between the weirdness of the quantum world and the familiarity of the macroscopic world…

Catches of the month: Phishing scams for August…

In our latest round-up of phishing scams, we look at how criminal hackers infiltrated Twitter and sent tweets from dozens of compromised accounts. We also explain how fraudsters impersonated Google Cloud Platform in a PDF…