Pages
Posts
Attacks and Hacking
Personal Development
- How to Create the Perfect Growth Plan for Your Business
- Celebrating Black and African American Marketers This February
- How To Determine Your Service/Product Profit Drivers (Use These Calculations)
- What Apple’s iOS 14 Update Means for Your Business
- The Local SEO Stats & Practical Tactics of Google’s Top-Ranked Grocery Stores
- What You May Have Missed: Moz Resources to Prioritize Community Learning and Professional Development in 2020
- 12 Women in Marketing to Watch Out For
- 5 Things to Do Right Now to Help Your Business Survive the iOS 14 Update
- How To Train Your Content Creators To Create Viral Content
- 4 Tips for Crafting Your Perfect Website Homepage
- How to Get People on Your Podcast
- Three Tools to Innovate Your Content Marketing Strategy
- 4 Things You NEED to Build the Perfect Twitter Strategy
- An SEO’s Experience in 2020: Opportunities and Challenges
- 3 Places to Use Your One-Liner To Convert More Customers
- Dennis Yu’s 2021 Prediction: The Future of Facebook
- DigitalMarketer 2020 Year in Review [Infographic]
- Answer These 3 Questions to Figure Out What Content To Put In Your Newsletter
- 4 Steps To Writing an Engaging Instagram Caption
- How Digital Marketing Will Change: 14 Predictions for 2021
- The Metrics that Matter for Your Business (And Where to Find Them)
- Avoiding False Conversions in Google Analytics
- What’s Changed (and What Hasn’t): The 2020 Moz Blog Reader Survey Results
- Maximize Return During Tough Times Through Testing
- The One Simple Tip to Help You Stand Out on LinkedIn
- How To Do Local SEO for Businesses Without Physical Locations in 2021
- Quitters Need Not Apply: 7 Ways Your Mindset Can Shape Your Success in the Internet Marketing Industry
- 4 Simple Ways to Increase the Value of Your Customers
- Competitive Analysis Best Practices
- When (and When Not) to Outsource Link Building
- Top 10 Changes That Impacted Google My Business in 2020
- How Steven Werley Overhauled his Sales Funnel to Double His Close Rate and Shorten His Profit Cycle
- 10 Basic SEO Tips to Index + Rank New Content Faster — Best of Whiteboard Friday
- What’s Working with Cold Email Right Now—2020
- Business as Unusual: How to Communicate Your New and Updated Services with Google My Business
- How to Position Yourself in Your Customer Story
- How to Make Sure Your Social Media Posts Really Stand Out in 2021
- Marketing for Survival: Donald Miller’s 2 Tips to Make Customers Buy
- The New Best Practices for Native Advertising on Editorial Sites
- How to Navigate Working with Problem Clients
- Rethinking the 3 Ps of Business
- Location Data + Reviews: The 1–2 Punch of Local SEO (Updated for 2020)
- There’s Gold In Them Thar SERPs: Mining Important SEO Insights from Search Results
- How Geofencing Marketing Can Help Your Business (Even if Your Business is Online)
- The ONE Question You Need to Grow Your Agency
- The State of Local SEO: Experts Weigh in on Industry-Specific Tactics
- Our Take on Glossier’s Ad Strategy
- HTTPS Is Table Stakes for SEO in 2020
- 2020 SaaS Survey Results- COVID Edition!
- Here’s Everything You need to Build Your First Marketing Blitz Launch
- The Pent-Up Demand Holiday Ad Strategy
- What is Alt Text
- Reporting on Ranking Changes with STAT’s Google Data Studio Connectors
- 7 Marketing Hacks to Make Your Life Easier
- What is Customer Experience (And Why You Need to Prioritize It)
- How to Use Instagram Reels in Your Marketing Strategy
- 3 Digital PR Tenets for Excellent Outreach
- The 24 Modern Marketing Commandments
- Celebrating Hispanic/Latinx Heritage Marketers This September and October
- Find the One Word That Sets Your Brand Apart and Boosts Conversions
- Why You Shouldn’t Underestimate Soft Skills on a Resume
- Page Authority 2.0: An Update on Testing and Timing
- Help Us Improve: The 2020 Moz Blog Reader Survey
- [INFOGRAPHIC] How to Create the Best Videos
- How to Craft the Story for Your Holiday Marketing Strategy
- Identifying Advanced GSC Search Performance Patterns (and What to Do About Them)
- How To Focus Your SEO Strategy: A Quick Guide for Businesses New to Online Optimization
- How Your Brand Can Earn Media Coverage on NBC News, USA Today, CNBC, and More
- 4 Questions To Make Sure You’re Creating Consistent Copy Across All Platforms
- Proximity Third: A Deeper Dive into a Local Ranking Factors Surprise
- MozCon Virtual 2020: Top Takeaways from Day One
- How SiteGeek Saved and Then Doubled Their Business and Started Landing More Qualified Leads and 10X Bigger Clients (Plus 3 Proven Tips to Help You Grow Your Own Business)
- Title Tags SEO: When to Include Your Brand and/or Boilerplate
- SEO Updates Marketers Need to Know About for Q3 of 2020
- How Big Is the Gender Gap Between Men and Women in SEO?
- Creative Diversification — More Hooks and Less Risk for Link Building
- A Traditional Marketing Success Story: How Oatly Dominated Plant Milks Without Using Social Media
- What is an Email Funnel?
- How to Craft and Nail Your Brand Voice
- 5 Examples of Welcome Email Sign Up Offers
- How to Make a Scalable SMS Chatbot Using Twilio, Python, and Google Sheets (with Free Code)
- 7 Best Twitter Accounts For Marketers to Follow
- How to Create a Content Calendar for Your YouTube Strategy
- What to Look for When Hiring a Community Manager
- The Real Short-Term and Long-Term Results of Content Marketing and Digital PR
- The 8 Most Important SEO Metrics to Track
- 7 Tips to Improve Communication on Your Marketing Team
- When is it Time to Outsource?
- Introducing the Moz API for Google Sheets
- 16 Tools to Make You a Better Social Media Marketer
- That’s a Wrap: MozCon Virtual 2020 Day Two Recap
- How to Train Your Facebook Pixel
- How to Start Your Content Cluster Strategy
- How to Bring Your Best Self to the Online Conference Season
- How to Use the Customer Avatar Worksheet to Nail Your Copy
- How to Choose the Most Link-Worthy Data Source for Your Content
- Thinking Beyond the Link Building “Campaign” [Case Study]
- 7 Must-Haves for Starting a Podcast
- Download the SEO’s Local Search Cheat Sheet!
- Third-party vs. In-house Delivery: A Guide to Informed Choice
- The 5 Most Important Metrics to Track Your YouTube Growth
- Preparing E-Commerce for the Post-COVID Bounce Back
- The State of Local SEO Industry Report 2020, Announced
- The First Step in Creating Video Ads That Sell
- 6 Tips For Shooting Videos Of Yourself On Your Own
- 6 Questions To Ask Yourself to See If an Online Community Is Right For Your Business
- How to Survive and Thrive in the post-Covid Era
- Help Us Improve: The 2020 Moz Blog Reader Survey Is Here
- Mapping Local Essentials: Being the Business that Grows, Sells, or Markets the Beans
- 5 Small Ways to Boost SEO Rankings
- #BlackoutTuesday
- How to Stay Creative With an SEO-Driven Content Strategy
- Marketing Tool Wizardry: Roland Frasier’s Most Coveted, Closely Guarded, Secret Stash Of Marketing Tools
- Take the COVID-19 Local Search Marketing Business Impact Survey
- How to Get Quick Results With SEO Sprints: The DriveSafe Case Study
- Use the Blank Sheet of Paper Test to Optimize for Natural Language Processing
- It’s Not About Influencers, It’s About Partnerships
- What is an Entrepreneur
- Diagnosing Traffic Drops During a Crisis: Was It You, Google, or the Whole World?
- How To Figure Out What Content Your Customer Avatar Wants
- How We Ranked a Single Page for 2.6K Keywords Driving 30K Monthly Searches [Case Study]
- Find The Pepsi to Your Coke: Using Competitive Analysis to Set Your Business Apart
- 7 Ideas for a More Effective Cold Email Campaign
- How One Determined Faerie Saved Her Small Business by Overhauling Her Entire Offer—Interview and Case Study
- How Google SERP Layouts Affect Searching Behavior
- Announcing: The Keyword Research Master Guide [New for 2020]
- 49 Marketing Strategies for Restaurants
- 9 Examples of Broadcast Emails
- What is a Marketing Agency?
- How to Lead a Team That Gets Stuff Done from Home
- How Your Local Business Can Be a Helper
- What is Email Deliverability?
- 6 Ways to Do Good as a Business During Times of Crisis
- Digital Marketing Strategies Brands Often Overlook
- 5 Quick Ecommerce Wins to Grow Your Ecommerce Store
- What Readers Want During COVID-19: Content Ideas for Every Niche
- 8 Marketing YouTube Channels You Should Follow to Keep Learning During Quarantine
- Pakistan Teenager, Muhammad Aarij, Becomes A Certified Copywriting Specialist During Statewide COVID-19 Quarantine With DigitalMarketer
- How to Participate in Video Conferencing Calls Without Looking Like a Fool
- How To Lead Your Team Well… From a Distance
- Help Your Community from Six Feet Away: Non-Marketing Tips from Mozzers
- UPDATE ON DIGITALMARKETER’S COVID-19 RESPONSE
- The Non-Technical Guide to Increase Site Speed
- [CASE STUDY] How DigitalMarketer Activated 44% of Previously Silent Community Members in 5 Days
- How to Query the Google Search Console API
- A Beginner’s Guide to Ranking in Google Maps
- The Only 4 Email Marketing Metrics That Matter
- What’s Working in Ecommerce: Strategies Used by 2020’s Most Cutting-Edge Brands
- Crawled — Currently Not Indexed: A Coverage Status Guide
- What is Experience Marketing?
- Better Site Speed: 4 Outside-the-Box Ideas
- Increase Email Click-Through Rate with These 4 Emotional Triggers
- Benchmark for Success: What Your Vertical Can Achieve With Content Marketing
- A Week in the Life of a Marketing Manager
- 2020 Google Search Survey: How Much Do Users Trust Their Search Results?
- They’re the Best Around: The Top 25 Moz Blog Posts of 2019
- 6 Easy Content Marketing Tips That Will Save You At Least an Hour This Week
- How Low Can #1 Go? (2020 Edition)
- Are H1 Tags Necessary for Ranking? [SEO Experiment]
- Spot Zero is Gone — Here’s What We Know After 30 Days
- 9 Steps to Repeatable, Scalable, and Profitable Growth
- DigitalMarketer’s Best Facebook Ads of 2019 (And the Lessons We Learned from Them)
- 6 Local Search Marketing DIY Tips for the Crafting Industry
- Show Some (HR Approved) Love to Your Co-Workers for Valentine’s Day
- The Power of "Is": A Featured Snippet Case Study
- Pay Attention to These SEO Trends in 2020 and Beyond
- The Dirty Little Featured Snippet Secret: Where Humans Rely on Algorithmic Intervention [Case Study]
- How BarkBox Took an Obscure Holiday and Turned It into a Killer Social Media Campaign
- The True Value of Top Publisher Links
- How to Scale Your Content Marketing: Tips from Our Journey to 100,000 Words a Month
- 101 Best Email Subject Lines of 2019
- DigitalMarketer 2019 Year in Review [Infographic]
- What Do High-Performance E-Commerce Websites Do Differently? Results from the 2020 KPI Study
- How to Use Tools to Determine Which Content to Re-Optimize: A Step-by-Step Guide
- Your Content Probably Isn’t Unique (And That’s Okay)
- The 4 Types of Email Newsletters
- 2020 Local SEO Success: How to Feed, Fight, and Flip Google
- How Digital Marketing Will Change: 17 Predictions for 2020
- How to Dominate Your Branded Search in Google
- This Is What Happens When You Accidentally De-Index Your Site from Google
- Breaking Down How Politicians Used Ads In 2019
- Becoming an Industry Thought Leader: Advanced Techniques for Finding the Best Places to Pitch Guest Posts
- Introducing a Brand New Way To Launch And Sell Products Online
- How to Find Writers for Your Blog
- Google Review Stars Drop by 14%
- The DigitalMarketer Team is STUFFED with Gratitude This Thanksgiving
- 2019 SAAS Private Survey Results- Part 1
- App Store SEO: How to Diagnose a Drop in Traffic & Win It Back
- 5 Marketing Strategies Top Marketers Are Using Right Now
- It’s Content and It’s Links – Are We Making SEO Too Complicated?
- 9 Popular Brands and What Makes Them So Addictive
- 17 Best Podcasts Of All Time For Content Marketers
- Why You Need to Start Working on Your Holiday Marketing Strategy NOW
- The 2019 Holiday Checklist for Local SEO Heroes
- How Artificial Intelligence is Shaping Digital Marketing: 5 Tools You Can Use NOW
- New Opportunities for Image SEO: How to Leverage Machine Vision for Strategic Wins
- 6 Ways to Get More Organic Traffic, Without Ranking Your Website
- The YouTube Ads Grid: A 3-Step System to Build YouTube Ads Campaigns that Generate More Leads & Sales
- Amazon vs. Google: Decoding the World’s Largest E-commerce Search Engine
- How to Use Keywords in Your Blogging Strategy
- What Is a Lead Magnet?
- 10 Instagram Stats That May Surprise You
- Digital Marketing Mythbusters: 7 Myths Debunked
- The Unique World of Franchise Marketing [Guide Sneak Peek]
- The Featured Snippets Cheat Sheet and Interactive Q&A
- SEO Analytics for Free – Combining Google Search with the Moz API
- 5 Things You Should Know About "People Also Ask" & How to Take Advantage
- When Should You Start Your Paid Traffic Campaign?
- Franchise Marketing: How People Buy Now
- 10 Statistics That Show Email Marketing Isn’t Dead
- New SEO Experiments: A/B Split Testing Google’s UGC Attribute
- Shopify SEO: The Guide to Optimizing Shopify
- Announcing Quick, Free SEO Metrics with a New Domain Analysis Tool
- The Evolution of Marketing Part 1: How Digital Marketing Compares to Historical Marketing
- How We Grew Blog Traffic by 650% in Two Years — Organically
- Retargeting Ads in 500 Words or Less (Plus 3 Bonus Retargeting Tips)
- How to Increase Instagram Story Engagement
- How Google’s Nofollow, Sponsored, & UGC Links Impact SEO
- The 4 Critical Steps to Landing Page Optimization
- What is a Tracking Pixel—Explained in 800 Words or Less
- How to Automate Pagespeed Insights For Multiple URLs using Google Sheets
- 10 Link Building Lies You Must Ignore
- An Agency Workflow for Google My Business Dead Ends
- The Data You’re Using to Calculate CTR is Wrong and Here’s Why
- Customer Value Optimization: How to Build an Unstoppable Business
- The Customer Avatar Worksheet: Finally, Get Clear on WHO You Are Selling To!
- What Is the Ideal Modern Marketing Team?
- How Going to a Marketing Conference Can Help Your Career
- Top Marketing Blogs to Follow
- Kindness as Currency: How Good Deeds Can Benefit Your Local Business
- Lead Volume vs. Lead Quality By RuthBurrReedy
- FAQ, HowTo, and Q&A: Using New Schema Types to Create Interactive Rich Results
- Fresh Features & Functionalities: A Six Month Look back at What’s New in Moz Pro
- How To Lead An Effective One-On-One
- How to Get Started Building Links for SEO
- 15 Quiz Funnel Examples to Inspire You
- How to Get a Customer to Edit Their Negative Review
- "Study Finds:" How Data-Driven Content Marketing Builds Links and Earns Press Mentions
- 20 of the Best Digital Marketing Quotes to Inspire the Modern Marketer
- How to Rescue Your B2B Content Marketing Strategy
- Case Study: How a Media Company Grew 400% and Used SEO to Get Acquired
- How to Screen and Recruit the Best SEO Content Writers
- Building a Repeatable, Scalable & Profitable Growth Process
- How to Set a Business Growth Goal (And Why You Should Have One)
- Empathetic Consulting: 3 Things to Remember When Working With Other Teams
- How to Create Audience-Engaging Content That Drives Results
- 11 Tips to Hire Freelancers Without Losing Your Mind
- High Rankings & Low Traffic: How to Fix It
- Do You Really Need Formal Marketing Training?
- 5 Tips to Perfect Your LinkedIn Summary
- The New Moz Local Is on Its Way!
- Podcasts in SERPs: Is Audio SEO The Next Frontier?
- A Handy ✋ Guide to Understanding Emojis
- How to Create a Podcast Studio on a Shoestring Budget
- DigitalMarketer’s New Funnel Strategy That Increased Trials by 700%
- The Ultimate List of Blog Post Ideas
- What is Copywriting?
- Use These 11 SEO Tools to Rank Higher on Search Engines
- Unicorn Marketers are Getting Insane Results by Using These 6 Facebook Messenger Bot Tactics
- Best of Perpetual Traffic—The 10 Most Popular Episodes
- Learn to Write Headlines That Get More Clicks [Plus FREE Swipe File Download]
- How Time Management Becomes Time Maximization
- 21 Ways to Triple Your B2B E‑Commerce Conversions
- The Future of Content Marketing and How to Adapt: Trends, Tactics, and Tools
- So You Went to Traffic & Conversion Summit 2019… Now What? (5 Next Steps to Help Implement What You Learned)
- Featured Snippets: Expectations VS Reality (& How to Win Them)
- Links as a Google Ranking Factor: A 2019 Study
- Top Tips for Agency Owners from DigitalMarketer Certified Partners
- 19 Tools to Make You a Better Social Media Marketer
- Rural Local SEO: A Marketing Package Strong on Education
- What is Email Marketing? A Quick Guide to Getting it Right
- 4 Key Lessons Content Marketers Can Take From Data Journalists
- Announcing the New Moz SEO Essentials Certificate: What It Is & How to Get Certified
- How Do I Improve My Domain Authority (DA)?
- 10 Basic SEO Tips to Index + Rank New Content Faster – Whiteboard Friday
- 4 Reasons Why You Should Be Retargeting Your Email Subscribers on Facebook
- SEO & Progressive Web Apps: Looking to the Future
- Creating Quality Content in 2019 (For Search Engines and People)
- I Want To Rank Beyond My Location: A Guide to How This Works
- How Bad Was Google’s Deindexing Bug?
- Restaurant Local SEO: The Google Characteristics of America’s Top-Ranked Eateries
- Content Writing Tips to Write Better Content (This 7-Step Process Can Work for Anyone)
- Our Own Sarah Bird Joins the 2019 Class of Henry Crown Fellows!
- Optimizing for Searcher Intent Explained in 7 Visuals
- Topical SEO: 7 Advanced Concepts of Link Relevance & Google Rankings
- The 5 SEO Recommendations That Matter in the End
- March 1st Google Update: The Mysterious Case of the 19-Result SERPs
- Onboarding your first Sales Hire as an Entrepreneur
- 5 Reasons Legacy Brands Struggle With SEO (and What to Do About Them)
- SEO Is a Means to an End: How Do You Prove Your Value to Clients?
- 7 PowerPoint Tips to Banish Boring Presentations
- The History of Digital Marketing
- 5 Lightning Fast Ways To Create Stellar Blog Content
- Traffic & Conversion Summit, the Largest Digital Marketing Event in North America, Acquired by Clarion Events
- SEO Channel Context: An Analysis of Growth Opportunities
- 9 Surefire Ways to Boost Social Media Following
- Communicating to Clients & Stakeholders in a Constantly Changing SEO Landscape
- 14 SEO Predictions for 2019 and Beyond, as Told by Mozzers
- Social Proof Notifications | Add Life and Trust to Your Online Store for More Conversions
- A Comprehensive Analysis of the New Domain Authority
- Affordable, Stat-Based Retail Strategy for Your Agency’s Clients
- Traffic & Conversion Summit Has Been Acquired
- Do Businesses Really Use Google My Business Posts? A Case Study
- 5 Essential Tips to Help Improve Your Social Media Strategy
- How to Set Up Metrics to Optimize Your Digital PR Team’s Press Coverage
- 5 Real Examples of Advanced Content Promotion Strategies
- How to Have the Ultimate Traffic & Conversion Summit 2019 Experience
- 9 Easy Organic Posts to Increase Page Engagement
- DigitalMarketer’s 21 Best Articles for Organic Traffic in 2018
- 2018 Private SAAS Company Survey- Part 2
- SaaStock Dublin 2018: Get inside your Buyer’s Head – Improve Conversion Rates
- Uncovering SEO Opportunities via Log Files
- Taking Local Inventory Online: An Interview with Pointy’s Mark Cummins
- Building a Repeatable, Scalable & Profitable Growth Process
- 7 Search Ranking Factors Analyzed: A Follow-Up Study
- Rewriting the Beginner’s Guide to SEO, Chapter 6: Link Building & Establishing Authority
- The coffee drinker’s guide to better brain health
- 60 Keto Snacks: The Ultimate Low Carb Snack Guide
- I’m starting today – meditation, mindfulness and mind-emptiness
- Little Has Changed
- Exercise for Cancer Survivors: Getting Your Life, and Your Body, Back After Treatment
- Free e-course – Principles of Neuroscience Masterclass
- Gear Guide: The Skinny on 4 New Activity Monitors
- When meditation fails. Five alternative ways to calm your anxious mind.
- Welcome to AoM’s New Look!
- 3 Fitness Apps You Need Now
- The Best of 2018: Guest Posts
- A 4 Step Exercise to Calm the Chaos in Your Brain
- WebSummit Presentations
- DigitalMarketer’s 101 Best Email Subject Lines of 2018 (…And 7 Top-Notch Subject Lines Pulled from the Vault)
- “Zero to 100” for High Growth SaaS – A workshop on how to build your Go-to-Market
- 6 Steps to Launch Your First LinkedIn Ads Campaign
- The World Economic Forum hosts Global Future Council on Neurotechnologies in Dubai (November 10–12th)
- Strength and Conditioning Stuff You Should Read: 12/1/18
- Top Two Reasons for Churn
- Matrix Growth Academy – Zero to 100 Videos
- It’s called a Journey for a Reason
- Facebook Ad Lessons I Learned That Will Help You Run Better Ad Campaigns in 2019
- The Brain’s Way of Healing – April Walking Book Club
- Potential new treatment for traumatic brain injury – the female hormone progesterone
- The Correct Number of Reps Per Set in the Gym
- 2018 SAAS Private Survey Results- Part 1
- Simplify your Strength Programming Using Die-Rolled Variability
- Towards a new culture of Brain Health and Brain Fitness
- The Easy Way to Up Your Daily Steps (and Why That Matters)
- We’re Overthinking Seed Round Signaling Effects
- A High Growth SaaS Playbook – 12 Metrics to Drive Success
- Zero to 100 – Photos from the SFO Sept 2018 event
- Guess what? You’re not your job.
- 43 Minute Upper Body and Cardio Kickboxing Workout (with warm up & cool down)
- “Zero to 100” for High Growth SaaS – A workshop on how to build your Go-to-Market – Sept 11th
- Fall 2018 TSC Results
- Answering 11 Hard-Hitting Questions About Organic and Paid Facebook: An Interview with Dennis Yu
- Gut-Brain Health – What Neuroscientists Are Calling “A Paradigm Shift”
- Upper Body Workout for Strength, Coordination and Control – Isolated Functional Strength Workout
- What It Really Feels Like to Get Bit by a Rattlesnake
- Content Comprehensiveness – Whiteboard Friday
- How to calculate your total addressable market and make a great TAM slide for investors
- The Never-Ending Journey: In Search of Product-Market-Fit
- Sleep-focused neurotech firm Dreem raises $35M from Johnson&Johnson Innovation and Bpifrance
- Brain injury (part 1) – mild concussion and the cycle helmet myth
- Assessments You Might Be Overlooking: Installment 6
- 2-Minute Yoga Flow to Stretch and De-Stress
- Zero to $50M – A Roadmap of the Key Stages, and How to Win at Each Stage
- Lost in Austin: Progressive Calisthenics in the Lone Star State
- 3 Tips to Set Up a Retargeting Campaign in 24 Hours (Even if You Have Never Heard of Retargeting Before)
- Can you prevent memory loss and brain ageing?
- The Easy 5 Step Practice that Quickly Stops Anxious and Depressing Thoughts
- Nick Kokonas — How to Apply World-Class Creativity to Business, Art, and Life (#341)
- Strength in the Teenage Years: An Overlooked Long-Term Athletic Development Competitive Advantage
- Beyond the See-Saw Press: Two New Variations
Regulations And Compliance
Security
- Twelve-Year-Old Vulnerability Found in Windows Defender
- APT Horoscope
- Organisations turn the tide on ransomware attackers
- What are the best books on data privacy?
- Friday Squid Blogging: Amazing Video of a Black-Eyed Squid Trying to Eat an Owlfish
- Router Security
- Personal data vs. sensitive data: what’s the difference?
- TikTok breaching users’ rights “on a massive scale”, says European Consumer Group
- Browser Tracking Using Favicons
- How to create an ISO 27001 secure development policy – with template
- US Cyber Command Valentine’s Day Cryptography Puzzles
- World Economic Forum: cyber crime is one of the “key threats of the next decade”
- On Vulnerability-Adjacent Vulnerabilities
- Chinese Supply-Chain Attack on Computer Systems
- Friday Squid Blogging: Flying Squid
- Medieval Security Techniques
- NoxPlayer Android Emulator Supply-Chain Attack
- 5 ways to improve your information security in 2021
- Ransomware Profitability
- A guide to cyber security for marketing agencies
- SonicWall Zero-Day
- Another SolarWinds Orion Hack
- Foxtons estate agency leaked thousands of customers’ financial records
- More SolarWinds News
- List of data breaches and cyber attacks in January 2021 – 878 million records breached
- Georgia’s Ballot-Marking Devices
- Including Hackers in NATO Wargames
- New iMessage Security Features
- Police Have Disrupted the Emotet Botnet
- Massive Brazilian Data Breach
- Friday Squid Blogging: Vegan Chili Squid
- What is a DoS (denial-of-service) attack?
- SVR Attacks on Microsoft 365
- Wentworth golf club hit by ransomware
- Sophisticated Watering Hole Attack
- How your staff make security decisions: The psychology of information security
- Injecting a Backdoor into SolarWinds Orion
- ISO 27001 checklist: a step-by-step guide to implementation
- Cell Phone Location Privacy
- Friday Squid Blogging: China Launches Six New Squid Jigging Vessels
- Finding the Location of Telegram Users
- United Nations security vulnerability exposed
- Catches of the month: Phishing scams for January 2021
- On US Capitol Security — By Someone Who Manages Arena-Rock-Concert Security
- A brief guide to cyber security risk assessments
- Changes in WhatsApp’s Privacy Policy
- Extracting Personal Information from Large Language Models Like GPT-2
- Russia’s SolarWinds Attack and Software Security
- Backdoor in Zyxel Firewalls and Gateways
- Military Cryptanalytics, Part III
- List of data breaches and cyber attacks in December 2020 – 148 million records breached
- Friday Squid Blogging: Linguine allo Scoglio Recipe
- Brexit Deal Mandates Old Insecure Crypto Algorithms
- On the Evolution of Ransomware
- What are organisations doing to address cyber security in 2021?
- Russia’s SolarWinds Attack
- Cellebrite Can Break Signal
- Friday Squid Blogging: Christmas Squid Memories
- How China Uses Stolen US Personnel Data
- 2020 in review: July to December
- Authentication Failure
- Eavesdropping on Phone Taps from Voice Assistants
- More on the SolarWinds Breach
- US Schools Are Buying Cell Phone Unlocking Systems
- Mexican Drug Cartels with High-Tech Spyware
- NSA on Authentication Hacks (Related to SolarWinds Breach)
- Zodiac Killer Cipher Solved
- Hackney cyber attack causes property buyers’ deals to fall through
- How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication
- Another Massive Russian Hack of US Government Networks
- Should There Be Limits on Persuasive Technologies?
- Catches of the month: Phishing scams for December 2020
- A Cybersecurity Policy Agenda
- Oblivious DNS-over-HTTPS
- Finnish Data Theft and Extortion
- A guide to cyber security for e-commerce businesses
- FireEye Hacked
- Hiding Malware in Social Media Buttons
- Friday Squid Blogging: Bigfin Squid Found in Australian Waters
- Enigma Machine Recovered from the Baltic Sea
- The 2020 Workshop on Economics and Information Security (WEIS)
- Open Source Does Not Equal Secure
- Spotify artists hacked by Taylor Swift ‘fan’
- Impressive iPhone Exploit
- List of data breaches and cyber attacks in November 2020 – 586 million records breached
- Cyber security statistics for small organisations
- Check Washing
- Friday Squid Blogging: Diplomoceras Maximum
- Undermining Democracy
- Cyber Public Health
- More on the Security of the 2020 US Election
- Top 3 Black Friday 2020 scams to avoid
- Indistinguishability Obfuscation
- Symantec Reports on Cicada APT Attacks against Japan
- Detecting Phishing Emails
- Friday Squid Blogging: Ram’s Horn Squid Video
- The US Military Buys Commercial Location Data
- Have you completed these 3 data protection tasks ahead of Brexit?
- Friday Squid Blogging: Chinese Squid Fishing Near the Galapagos
- Data flow mapping key to EU–third country data transfers
- Google Responds to Warrants for “About” Searches
- When are schools required to report personal data breaches?
- Inrupt’s Solid Announcement
- New Zealand Election Fraud
- Why MSPs and their partners must prioritise cyber security
- Is your organisation ready for the DSP Toolkit compliance deadline?
- The Security Failures of Online Exam Proctoring
- What are the best cyber security training courses?
- Amazon Delivery Drivers Hacking Scheduling System
- Friday Squid Blogging: Nano-Sized SQUIDS
- Friday Squid Blogging: Peru Defends Its Waters against Chinese Squid Fishing Boats
- Catches of the month: Phishing scams for November 2020
- New Bluetooth Vulnerability
- The Legal Risks of Security Research
- New Windows Zero-Day
- Hacking Apple for Profit
- Friday Squid Blogging: Interview with a Squid Researcher
- Hacking a Coffee Maker
- The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
- Experian’s data processing practices violate the GDPR
- Documented Death from a Ransomware Attack
- IMSI-Catchers from Canada
- New Report on Police Decryption Capabilities
- Friday Squid Blogging: Squid-like Nebula
- Have you met the DSP Toolkit deadline?
- NSA Advisory on Chinese Government Hacking
- Ransomware attackers donate stolen money to charity
- What is the ISO 27000 series of standards?
- Split-Second Phantom Images Fool Autopilots
- US Cyber Command and Microsoft Are Both Disrupting TrickBot
- 2020 Workshop on Economics of Information Security
- The effects of phishing awareness training wear off over time
- Matt Blaze on OTP Radio Stations
- How organisations are completing EU–US data transfers following demise of the Privacy Shield
- New Privacy Features in iOS 14
- Catches of the month: Phishing scams for October 2020
- What is data loss and how does it work?
- Your cyber security risk mitigation checklist
- Friday Squid Blogging: After Squidnight
- COVID-19 and Acedia
- List of data breaches and cyber attacks in September 2020 – 267 million records breached
- Will hospitals wake up to the threat of cyber crime after patient dies during a ransomware attack?
- GDPR Article 32: Your guide to the requirements
- On Executive Order 12333
- CEO of NS8 Charged with Securities Fraud
- Friday Squid Blogging: COVID-19 Found on Chinese Squid Packaging
- How small organisations can fast-track ISO 27001 implementation
- Small business cyber security: the ultimate guide
- Iranian Government Hacking Android
- Interview with the Author of the 2000 Love Bug Virus
- Cambridgeshire crowned the UK’s cyber crime capital
- Former NSA Director Keith Alexander Joins Amazon’s Board of Directors
- The Third Edition of Ross Anderson’s Security Engineering
- Nihilistic Password Security Questions
- Why has there been increase in cyber risks for the education sector?
- How the FIN7 Cybercrime Gang Operates
- How breach detection tools can help organisations save money and protect their reputation
- Privacy Analysis of Ambient Light Sensors
- Interesting Attack on the EMV Smartcard Payment Standard
- Ranking National Cyber Power
- More on NIST’s Post-Quantum Cryptography
- Friday Squid Blogging: Calamari vs. Squid
- US Space Cybersecurity Directive
- Newcastle University becomes latest ransomware victim as education sector fails to heed warnings
- More on NIST’s Post-Quantum Cryptography
- Seny Kamara on "Crypto for the People"
- US Postal Service Files Blockchain Voting Patent
- Schneier.com is Moving
- Catches of the month: Phishing scams for September 2020
- Hacking AI-Graded Tests
- Friday Squid Blogging: Morning Squid
- Seny Kamara on “Crypto for the People”
- 2017 Tesla Hack
- The cost of a data breach in 2020
- Insider Attack on the Carnegie Library
- North Korea ATM Hack
- Friday Squid Blogging: How Squid Survive Freezing, Oxygen-Deprived Waters
- Cory Doctorow on The Age of Surveillance Capitalism
- Amazon Supplier Fraud
- 235 million TikTok, YouTube and Instagram accounts compromised in web scraping blunder
- Identifying People by Their Browsing Histories
- Vulnerability scans and false positives: the importance of sanitising input
- DiceKeys
- NSA on Securing VPNs
- Friday Squid Blogging: Rhode Island’s State Appetizer Is Calamari
- Yet Another Biometric: Bioacoustic Signatures
- ISO 27701: UKAS requirements for ISMS certification bodies
- Copying a Key by Listening to It in Action
- Data controller vs data processor: what’s the difference?
- Vaccine for Emotet Malware
- 54% of universities reported a data breach in the past year
- Using Disinformation to Cause a Blackout
- Robocall Results from a Telephony Honeypot
- GDPR supervisory authorities issued £2.6 million in fines in Q2 2020
- Drovorub Malware
- Friday Squid Blogging: Editing the Squid Genome
- UAE Hack and Leak Operations
- How to boost your Cyber Essentials certification
- Update on NIST’s Post-Quantum Cryptography Program
- Ransomware victim Travelex forced into administration
- Collecting and Selling Mobile Phone Location Data
- Smart Lock Vulnerability
- Hacking a Power Supply
- A Peek into the Fake Review Marketplace
- Friday Squid Blogging: New SQUID
- Catches of the month: Phishing scams for August 2020
- Does remote working affect the cost of a data breach?
- Cybercrime in the Age of COVID-19
- BlackBerry Phone Cracked
- Friday Squid Blogging: Squid Proteins for a Better Face Mask
- Data and Goliath Book Placement
- Fake Stories in Real News Sites
- China Closing Its Squid Spawning Grounds
- Bogus Security Technology: An Anti-5G USB Stick
- Facebook Announces Messenger Security Features that Don’t Compromise Privacy
- Universities across the UK and North America confirm cyber attack
- ISO 27001: The 14 control sets of Annex A explained
- Friday Squid Blogging: Fishing for Jumbo Squid
- New Research: “Privacy Threats in Intimate Relationships”
- Zoom’s Commitment to User Security Depends on Whether you Pay It or Not
- Adversarial Machine Learning and the CFAA
- Fraudster tried to steal football club’s £1 million transfer fee
- Fawkes: Digital Image Cloaking
- GDPR data transfer rules: what you need to know
- Availability Attacks against Neural Networks
- On the Twitter Hack
- Security Analysis of the Democracy Live Online Voting System
- The importance of trust
- Friday Squid Blogging: Squid Found on Provincetown Sandbar
- EU–US Privacy Shield ruled invalid by the European Court of Justice
- Another California Data Privacy Law
- Celebrity Twitter accounts hacked in coordinated cyber attack
- How to document PCI DSS-compliant policies and procedures
- Enigma Machine for Sale
- EFF’s 30th Anniversary Livestream
- Business Email Compromise (BEC) Criminal Ring
- Traffic Analysis of Home Security Cameras
- World Economic Forum outlines three steps for cyber security success
- Half a Million IoT Passwords Leaked
- The Security Value of Inefficiency
- UK cyber crime rate has doubled in the past five years
- Friday Squid Blogging: Strawberry Squid
- Hacked by Police
- GDPR for small business: the ultimate guide
- List of data breaches and cyber attacks in June 2020 – 7 billion records breached
- Securing the International IoT Supply Chain
- Android Apps Stealing Facebook Credentials
- iPhone Apps Stealing Clipboard Data
- COVID-19 Risks of Flying
- The Unintended Harms of Cybersecurity
- Analyzing IoT Security Best Practices
- Cryptocurrency Pump and Dump Scams
- Nation-State Espionage Campaigns against Middle East Defense Contractors
- Security and Human Behavior (SHB) 2020
- Australian government bombarded by cyber attacks
- New Hacking-for-Hire Company in India
- Bank Card “Master Key” Stolen
- Friday Squid Blogging: Giant Squid Washes Up on South African Beach
- Social engineering: what it is and how to avoid it
- The skills and techniques you need to become a front-end developer
- Theft of CIA’s “Vault Seven” Hacking Tools Due to Its Own Lousy Security
- Avon’s UK website offline a week after suffering cyber attack
- Zoom Will Be End-to-End Encrypted for All Users
- Eavesdropping on Sound Using Variations in Light Bulbs
- Examining the US Cyber Budget
- Friday Squid Blogging: Human Cells with Squid-Like Transparency
- Facebook Helped Develop a Tails Exploit
- COVID-19 and its effects on cyber espionage and national security
- Another Intel Speculative Execution Vulnerability
- Bart Gellman on Snowden
- Phishing Attacks Against Trump and Biden Campaigns
- Gene Spafford on Internet Voting
- Why your IT team needs cyber security training
- Malware in Google Apps
- Friday Squid Blogging: Shark vs. Squid
- Catches of the month: Phishing scams for June 2020
- Average cost of cyber crime rises to £10.3 million
- Wallpaper that Crashes Android Phones
- Verizon’s 2020 Data Breach Investigations Report debunks popular cyber crime myth
- “Sign in with Apple” Vulnerability
- Password Changing After a Breach
- List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached
- Friday Squid Blogging: Humboldt Squid Communication
- Thermal Imaging as Security Theater
- The pros and cons of vulnerability scanning
- Websites Conducting Port Scans
- Secure Together: is your organisation prepared for the end of lockdown?
- Bluetooth Vulnerability: BIAS
- Friday Squid Blogging: Vegan “Squid” Made from Chickpeas
- Friday Squid Blogging: Squid Can Edit Their Own Genomes
- New US Electronic Warfare Platform
- Ann Mitchell, Bletchley Park Cryptanalyst, Dies
- Criminals and the Normalization of Masks
- 9 million people affected by easyJet cyber attack
- How to conduct an ISO 27001 internal audit
- AI and Cybersecurity
- Spike in cyber security incidents since lockdown began
- Ramsey Malware
- On Marcus Hutchins
- US Government Exposes North Korean Malware
- Attack Against PC Thunderbolt Port
- COVID-19: addressing your organisation’s cyber risk and data privacy response measures
- Microsoft Buys Corp.com
- Friday Squid Blogging: Jurassic Squid Attack
- Used Tesla Components Contain Personal Information
- iOS XML Bug
- Secure Together: fake puppy sales and face mask scams
- ILOVEYOU Virus
- RSA-250 Factored
- Catches of the month: Phishing scams for May 2020
- Marriott Was Hacked — Again
- Friday Squid Blogging: Squid Orders Down in Italy
- Friday Squid Blogging: Cocaine Smuggled in Squid
- Me on COVAD-19 Contact Tracing Apps
- Securing Internet Videoconferencing Apps: Zoom and Others
- Secure Together: supermarket scams and strengthening your Wi-Fi signal
- How Did Facebook Beat a Federal Wiretap Demand?
- Fooling NLP Systems Through Word Swapping
- Top cyber security tips for keeping kids safe online
- Automatic Instacart Bots
- Clarifying the Computer Fraud and Abuse Act
- Global Surveillance in the Wake of COVID-19
- Friday Squid Blogging: Humboldt Squid Backlight Themselves to Communicate More Clearly
- Chinese COVID-19 Disinformation Campaign
- Friday Squid Blogging: On the Efficacy of Squid as Bait
- Another Story of Bad 1970s Encryption
- Vulnerability Finding Using Machine Learning
- 5 best online cyber security training courses and certifications in 2020
- The DoD Isn’t Fixing Its Security Problems
- California Needlessly Reduces Privacy During COVID-19 Pandemic
- Ransomware Now Leaking Stolen Documents
- Contact Tracing COVID-19 Infections via Smartphone Apps
- Cybersecurity Law Casebook
- Friday Squid Blogging: Amazingly Realistic Squid Drawings
- Kubernetes Security
- Friday Squid Blogging: The Effect of Noise on Squid
- Is Zoom safe to use?
- Facial Recognition for People Wearing Masks
- Secure Together: cyber attacks against hospitals and how to protect your home Wi-Fi
- National Cyber Security Centre warns public about coronavirus scams
- Cybersecurity During COVID-19
- The cyber security risks of working from home
- Emotat Malware Causes Physical Damage
- The Insecurity of WordPress and Apache Struts
- Friday Squid Blogging: On Squid Communication
- Facebook’s Download-Your-Data Tool Is Incomplete
- Catches of the month: Phishing scams for April 2020 – the coronavirus special
- Secure together: protecting your mental health during the COVID-19 pandemic
- Dark Web Hosting Provider Hacked
- Privacy vs. Surveillance in the Age of COVID-19
- Story of Gus Weiss
- Friday Squid Blogging: Squid Can Edit Their Own Genome
- How to start your career in cyber security
- Coronavirus: maintaining GDPR compliance during the COVID-19 pandemic
- Secure together: Managing your WordPress access during coronavirus
- Internet Voting in Puerto Rico
- Hacking Voice Assistants with Ultrasonic Waves
- GDPR data subject access requests (DSARs): How to respond – free guide
- Work-from-Home Security Advice
- Hackers exploit coronavirus fears as cyber attacks soar
- TSA Admits Liquid Ban Is Security Theater
- The EARN-IT Act
- GDPR: lawful bases for processing, with examples
- The Whisper Secret-Sharing App Exposed Locations
- LA Covers Up Bad Cybersecurity
- CIA Dirty Laundry Aired
- Infographic: Cyber Attacks and Data Breaches of 2019
- Catches of the month: Phishing scams for March 2020
- More on Crypto AG
- Security of Health Information
- Let’s Encrypt Vulnerability
- How to write a GDPR data privacy notice – with template example
- Wi-Fi Chip Vulnerability
- Deep Learning to Find Malicious Email Attachments
- Russia Is Trying to Tap Transatlantic Cables
- Friday Squid Blogging: Squid Eggs
- Humble Bundle’s 2020 Cybersecurity Books
- Sports retail giant Decathlon leaks 123 million customer and employee records
- Securing the Internet of Things through Class-Action Lawsuits
- How to develop a robust cyber security policy
- Newly Declassified Study Demonstrates Uselessness of NSA’s Phone Metadata Program
- Firefox Enables DNS over HTTPS
- Inrupt, Tim Berners-Lee’s Solid, and Me
- Policy vs Technology
- Friday Squid Blogging: 13-foot Giant Squid Caught off New Zealand Coast
- 72 hours and counting: Reporting data protection breaches under the GDPR
- Redcar and Cleveland Borough Council still offline after suffering cyber attack
- Internet of Things Candle
- Friday Squid Blogging: An MRI Scan of a Squid’s Brain
- Top tips for data retention under the GDPR
- Hacking McDonald’s for Free Food
- Voatz Internet Voting App Is Insecure
- Friday Squid Blogging: The Pterosaur Ate Squid
- Customer Tracking at Ralphs Grocery Store
- DNSSEC Keysigning Ceremony Postponed Because of Locked Safe
- A US Data Protection Agency
- Companies that Scrape Your Email
- Tree Code
- Apple’s Tracking-Prevention Feature in Safari has a Privacy Bug
- Attacking Driverless Cars with Projected Images
- New Ransomware Targets Industrial Control Systems
- Security in 2020: Revisited
- A New Clue for the Kryptos Sculpture
- New Research on the Adtech Industry
- NSA Security Awareness Posters
- U.S. Department of Interior Grounding All Drones
- Collating Hacked Data Sets
- Smartphone Election in Washington State
- How will Cyber Essentials changes affect you?
- Google Receives Geofence Warrants
- Modern Mass Surveillance: Identify, Correlate, Discriminate
- Brazil Charges Glenn Greenwald with Cybercrimes
- Technical Report of the Bezos Phone Hack
- ISO 27001 management review: a practical guide
- Apple Abandoned Plans for Encrypted iCloud Backup after FBI Complained
- Half a Million IoT Device Passwords Published
- SIM Hijacking
- Clearview AI and Facial Recognition
- Friday Squid Blogging: Giant Squid Genome Analyzed
- Twitter axes Grindr following “insane violation” of user privacy
- Securing Tiffany’s Move
- Critical Windows Vulnerability Discovered by NSA
- Your ISO 27701 questions answered
- 5G Security
- Travelex says it won’t pay ransom to crooks as currency chaos continues
- Artificial Personas and Public Discourse
- Telemarketing company suspends business following ransomware attack
- Friday Squid Blogging: Stuffed Squid with Vegetables and Pancetta
- Police Surveillance Tools from Special Services Group
- Dixons Carphone hit with £500,000 fine for massive data breach
- 11 cyber security predictions for 2020
- New SHA-1 Attack
- USB Cable Kill Switch for Laptops
- Catches of the month: Phishing scams for January 2020
- Mailbox Master Keys
- Friday Squid Blogging: Giant Squid Video from the Gulf of Mexico
- Chrome Extension Stealing Cryptocurrency Keys and Passwords
- List of data breaches and cyber attacks in December 2019 – 627 million records breached
- Mysterious Drones are Flying over Colorado
- Hacking School Surveillance Systems
- 2019 end-of-year review part 2: July to December
- Friday Squid Blogging: Streamlined Quick Unfolding Investigation Drone
- Friday Squid Blogging: New Species of Bobtail Squid
- Chinese Hackers Bypassing Two-Factor Authentication
- Iranian Attacks on Industrial Control Systems
- How to document the scope of your ISMS
- Doorstep Dispensaree becomes the first UK organisation to receive a GDPR fine
- ToTok Is an Emirati Spying Tool
- Andy Ellis on Risk Assessment
- How to write an ISO 27001-compliant risk assessment procedure
- Homemade TEMPEST Receiver
- 7 steps to a successful ISO 27001 risk assessment
- RSA-240 Factored
- Why GDPR compliance requires a software solution
- Watch out for scams as Brexit confusion intensifies
- Manipulating Machine Learning Systems by Manipulating Training Data
- Friday Squid Blogging: T-Shirt
- Watch out for phishing scams this Christmas
- How to protect your organisation after a ransomware attack
- 7 mistakes that ISO 27001 auditors make
- A Broken Random Number Generator in AMD Microcode
- Eavesdropping on SMS Messages inside Telco Networks
- Scaring People into Supporting Backdoors
- Friday Squid Blogging: Color-Changing Properties of the Opalescent Inshore Squid
- EFF on the Mechanics of Corporate Surveillance
- Mapping Security and Privacy Research across the Decades
- Extracting Data from Smartphones
- Reforming CDA 230
- Failure Modes in Machine Learning
- Edward Snowden’s Memoirs
- Why Technologists Need to Get Involved in Public Policy
- Election Machine Insecurity Story
- Becoming a Tech Policy Activist
- The Story of Tiversa
- Adding a Hardware Backdoor to a Networked Computer
- Measuring the Security of IoT Devices
- The NSA Warns of TLS Inspection
- Friday Squid Blogging: Squid-Like Underwater Drone
- NTSB Investigation of Fatal Driverless Car Accident
- DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy
- Friday Squid Blogging: 80-Foot Steel Kraken Deliberately Sunk
- xHelper Malware for Android
- Technology and Policymakers
- Fooling Voice Assistants with Lasers
- GPS Manipulation
- Iran Has Shut Off its Internet
- Resources for Measuring Cybersecurity
- TPM-Fail Attacks Against Cryptographic Coprocessors
- Friday Squid Blogging: Planctotuethis Squid
- Friday Squid Blogging: Triassic Kraken
- WhatsApp Sues NSO Group
- ICT Supply-Chain Security
- Details on Uzbekistan Government Malware: SandCat
- Wi-Fi Hotspot Tracking
- Details of an Airbnb Fraud
- Obfuscation as a Privacy Tool
- Tracking by Smart TVs
- Friday Squid Blogging: Six-Foot-Long Mass of Squid Eggs Found on Great Barrier Reef
- Speakers Censored at AISA Conference in Melbourne
- Russians Hack FBI Comms System
- Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors
- Friday Squid Blogging: Researchers Investigating Using Squid Propulsion for Underwater Robots
- Dark Web Site Taken Down without Breaking Encryption
- New Biometrics
- Public Voice Launches Petition for an International Moratorium on Using Facial Recognition for Mass Surveillance
- Calculating the Benefits of the Advanced Encryption Standard
- I’m Looking to Hire a Strategist to Help Figure Out Public-Interest Tech
- Another Side Channel in Intel Chips
- Using Machine Learning to Detect IP Hijacking
- Cracking the Passwords of Early Internet Pioneers
- Factoring 2048-bit Numbers Using 20 Million Qubits
- Cheating at Professional Poker
- I Have a New Book: We Have Root
- Friday Squid Blogging: Apple Fixes Squid Emoji
- New Reductor Nation-State Malware Compromises TLS
- Illegal Data Center Hidden in Former NATO Bunker
- New Unpatchable iPhone Exploit Allows Jailbreaking
- Friday Squid Blogging: Hawaiian Bobtail Squid Squirts Researcher
- More Cryptanalysis of Solitaire
- When Biology Becomes Software
- New Research into Russian Malware
- NSA on the Future of National Cybersecurity
- Supply-Chain Security and Trust
- NotPetya
- Friday Squid Blogging: Did Super-Intelligent Giant Squid Steal an Underwater Research Station?
- Superhero Movies and Security Lessons
- On Chinese “Spy Trains”
- Ineffective Package Tracking Facilitates Fraud
- On Cybersecurity Insurance
- France Outlines Its Approach to Cyberwar
- Default Password for GPS Trackers
- Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
- Friday Squid Blogging: Piglet Squid
- Revisiting Software Vulnerabilities in the Boeing 787
- The Doghouse: Crown Sterling
- Credit Card Privacy
- Friday Squid Blogging: Why Mexican Jumbo Squid Populations Have Declined
- Friday Squid Blogging: How Scientists Captured the Giant Squid Video
- Smart Watches and Cheating on Tests
- Fabricated Voice Used in Financial Fraud
- The Threat of Fake Academic Research
- Evaluating the NSA’s Telephony Metadata Program
- Friday Squid Blogging: Vulnerabilities in Squid Server
- How Privacy Laws Hurt Defendants
- Attorney General William Barr on Encryption Policy
- Massive iPhone Hack Targets Uyghurs
- Zoom Vulnerability
- Election Security
- Attacking the Intel Secure Enclave
- AI Emotion-Detection Arms Race
- The Myth of Consumer-Grade Security
- Detecting Credit Card Skimmers
- Person in Latex Mask Impersonated French Minister
- Modifying a Tesla to Become a Surveillance Platform
- License Plate “NULL”
- Google Finds 20-Year-Old Microsoft Windows Vulnerability
- Surveillance as a Condition for Humanitarian Aid
- Software Vulnerabilities in the Boeing 787
- Side-Channel Attack against Electronic Locks
- Friday Squid Blogging: Robot Squid Propulsion
- Bypassing Apple FaceID’s Liveness Detection Feature
- Attorney General Barr and Encryption
- Exploiting GDPR to Get Private Information
- Friday Squid Blogging: Sinuous Asperoteuthis Mangoldae Squid
- AT&T Employees Took Bribes to Unlock Smartphones
- Supply-Chain Attack against the Electron Development Platform
- Brazilian Cell Phone Hack
- Friday Squid Blogging: Possible New Squid Species
- Regulating International Trade in Commercial Spyware
- More on Backdooring (or Not) WhatsApp
- Facebook Plans on Backdooring WhatsApp
- Friday Squid Blogging: Piglet Squid Video
- ACLU on the GCHQ Backdoor Proposal
- Software Developers and Security
- Presidential Candidate Andrew Yang Has Quantum Encryption Policy
- John Paul Stevens Was a Cryptographer
- Friday Squid Blogging: When the Octopus and Squid Lost Their Shells
- Friday Squid Blogging: Humbolt Squid in Mexico is Getting Smaller
- Insider Logic Bombs
- Google Releases Basic Homomorphic Encryption Tool
- Science Fiction Writers Helping Imagine Future Threats
- Friday Squid Blogging: Squid Tea Bags
- Friday Squid Blogging: Squid Mural
- A Harlequin Romance Novel about Hackers
- Chinese Military Wants to Develop Custom OS
- Lessons Learned Trying to Secure Congressional Campaigns
- The Cost of Cybercrime
- Palantir’s Surveillance Service for Law Enforcement
- Data, Surveillance, and the AI Arms Race
- Friday Squid Blogging: Climate Change Could be Good for Squid
- Clickable Endnotes to Click Here to Kill Everybody
- Resetting Your GE Smart Light Bulb
- Details of the Cloud Hopper Attacks
- Cardiac Biometric
- Ransomware Recovery Firms Who Secretly Pay Hackers
- Computers and Video Surveillance
- Research on Human Honesty
- Friday Squid Blogging: Squid Cars
- US Journalist Detained When Returning to US
- Digital License Plates
- The Human Cost of Cyberattacks
- Yubico Security Keys with a Crypto Flaw
- Rock-Paper-Scissors Robot
- Germany Talking about Banning End-to-End Encryption
- Friday Squid Blogging: More Materials Science from Squid Skin
- NSA Hawaii
- MongoDB Offers Field Level Encryption
- iPhone Apps Surreptitiously Communicated with Unknown Servers
- Cryptanalyzing a Pair of Russian Encryption Algorithms
- How Technology and Politics Are Changing Spycraft
- Friday Squid Blogging: On Squid Intelligence
- Hacking Hardware Security Modules
- Risks of Password Managers
- Maciej Cegłowski on Privacy in the Information Age
- More Attacks against Computer Automatic Update Systems
- Friday Squid Blogging: Squid Skin “Inspires” New Thermal Sheeting
- A “Department of Cybersecurity”
- Video Surveillance by Computer
- Workshop on the Economics of Information Security
- Security and Human Behavior (SHB) 2019
- Alex Stamos on Content Moderation and Security
- The Concept of “Return on Data”
- Thangrycat: A Serious Cisco Vulnerability
- Leaked NSA Hacking Tools
- Unhackable Cryptography?
- China Spying on Undersea Internet Cables
- Vulnerability in French Government Tchap Chat App
- Stealing Ethereum by Guessing Weak Private Keys
- Friday Squid Blogging: Toraiz SQUID Digital Sequencer
- Friday Squid Blogging: New Squid Species off the New Zealand Coast
- Visiting the NSA
- Amazon Is Losing the War on Fraudulent Sellers
- International Spy Museum Reopens
- Cryptanalysis of SIMON-32/64
- Reverse Engineering a Chinese Surveillance App
- Why Are Cryptographers Being Denied Entry into the US?
- Excellent Analysis of the Boeing 737 MAX Software Problems
- G7 Comes Out in Favor of Encryption Backdoors
- New DNS Hijacking Attacks
- Vulnerabilities in the WPA3 Wi-Fi Security Protocol
- Adversarial Machine Learning against Tesla’s Autopilot
- How the Anonymous Artist Bansky Authenticates His or Her Work
- Former Mozilla CTO Harassed at the US Border
- Hey Secret Service: Don’t Plug Suspect USB Sticks into Random Computers
- Ghidra: NSA’s Reverse-Engineering Tool
- Friday Squid Blogging: Fried Squid Recipe
- Videos and Links from the Public-Interest Technology Track at the RSA Conference
- Triton
- Critical Flaw in Swiss Internet Voting System
- Enigma, Typex, and Bombe Simulators
- I Was Cited in a Court Decision
- Friday Squid Blogging: A Squid-Related Vacation Tour in Hawaii
- Personal Data Left on Used Laptops
- Friday Squid Blogging: New Research on Squid Camouflage
- CAs Reissue Over One Million Weak Certificates
- Friday Squid Blogging: Restoring the Giant Squid at the Museum of Natural History
- Recovering Smartphone Typing from Microphone Sounds
- Mail Fishing
- DARPA Is Developing an Open-Source Voting System
- Malware Installed in Asus Computers Through Hacked Update Process
- Programmers Who Don’t Understand Security Are Poor at Security
- NSA-Inspired Vulnerability Found in Huawei Laptops
- Zipcar Disruption
- An Argument that Cybersecurity Is Basically Okay
- First Look Media Shutting Down Access to Snowden NSA Archives
- Friday Squid Blogging: A Tracking Device for Squid
- USB Cable with Embedded Wi-Fi Controller
- Friday Squid Blogging: The Hawaiian Bobtail Squid Genome
- China’s AI Strategy and its Security Implications
- Public-Interest Tech at the RSA Conference
- Security Flaws in Children’s Smart Watches
- iPhone FaceTime Vulnerability
- Japanese Government Will Hack Citizens’ IoT Devices
- Friday Squid Blogging: Squids on the Tree of Life
- Hacking the GCHQ Backdoor
- Hacking Construction Cranes
- Friday Squid Blogging: Squid Lollipops
- Prices for Zero-Day Exploits Are Rising
- Upcoming Speaking Engagements
- Friday Squid Blogging: New Giant Squid Video
- Security Vulnerabilities in Cell Phone Systems
- Infographic: List of data breaches in 2018
- EU Offering Bug Bounties on Critical Open-Source Software
- Machine Learning to Detect Software Vulnerabilities
- New Attack Against Electrum Bitcoin Wallets
- Friday Squid Blogging: The Future of the Squid Market
- Podcast Interview with Eva Gaperon
- Long-Range Familial Searching Forensics
- Friday Squid Blogging: Squid-Focused Menus in Croatia
- Stealing Nativity Displays
- Human Rights by Design
- MD5 and SHA-1 Still Used in 2018
- Friday Squid Blogging: Illegal North Korean Squid Fishing
- Fraudulent Tactics on Amazon Marketplace
- Friday Squid Blogging: Roasted Squid with Tomatillo Salsa
- Privacy for Tigers
- Friday Squid Blogging: Eat Less Squid
- Google finds bug in Google+ – 52.5 million users affected
- Security in a World of Physically Capable Computers
- Defeating the “Deal or No Deal” Arcade Game
- Friday Squid Blogging: Watch Squid Change Colors
- More on the Five Eyes Statement on Encryption and Backdoors
- Amazon’s data breach email looks like a phishing scam
- Author podcast: Security in the Digital World with Graham Day
- Free DPO resources
- Pegasus Spyware Used in 45 Countries
- Achieve your professional potential with 15% off our courses
- iOS 12.1 Vulnerability