Skip to content

PossibleThreat Articles

Articles for the experts…

  • Security
    • Sophos
    • MalwareBytes
    • TrendMicro
    • Microsoft
    • Fortinet
  • Sciences
  • Independent
    • Krebs
    • Wired
    • Securiteam
    • ComputerWorld

Cryptography

Security Sophos 

Smart light bulbs could give away your password secrets

August 22, 2023 0 Comments Cryptography, tapo, tp-link, vulnerability

Credit to Author: Paul Ducklin| Date: Tue, 22 Aug 2023 17:56:44 +0000

Cryptography isn’t just about secrecy. You need to take care of authenticity (no imposters!) and integrity (no tampering!) as well.

Read more
Security Sophos 

S3 Ep147: What if you type in your password during a meeting?

August 10, 2023 0 Comments bust, cryptocurrency, Cryptography, Cybercrime, data leakage, data loss, Hacking, Intel, Law & order, Naked Security Podcast, Podcast, surveillance

Credit to Author: Paul Ducklin| Date: Thu, 10 Aug 2023 13:34:14 +0000

Latest episode – listen now! (Full transcript inside.)

Read more
Security Sophos 

S3 Ep145: Bugs With Impressive Names!

July 27, 2023 0 Comments Apple, bwain, Cryptography, data loss, iPhone, Naked Security Podcast, Podcast, spyware, tetra:burst, triangulation trojan, vulnerability, zenbleed

Credit to Author: Paul Ducklin| Date: Thu, 27 Jul 2023 16:47:06 +0000

Fascinating fun (with a serious and educational side) – listen now! Full transcript available inside.

Read more
Security Sophos 

Hacking police radios: 30-year-old crypto flaws in the spotlight

July 24, 2023 0 Comments Black Hat, black haty, Cryptography, kerckhoff's principle, tetra, vulnerability

Credit to Author: Paul Ducklin| Date: Mon, 24 Jul 2023 16:59:43 +0000

“Three may keep a secret, if two of them are dead.”

Read more
Security Sophos 

Microsoft hit by Storm season – a tale of two semi-zero days

July 18, 2023 0 Comments 0 day, authentication, Cryptography, data loss, Microsoft, storm, vulnerability

Credit to Author: Paul Ducklin| Date: Tue, 18 Jul 2023 16:59:18 +0000

The first compromise didn’t get the crooks as far as they wanted, so they found a second one that did…

Read more
Security Sophos 

S3 Ep137: 16th century crypto skullduggery

June 1, 2023 0 Comments bust, Crypto, Cryptography, cve-2023-32784, Cybercrime, data loss, keepass, Law & order, oauth, Podcast, Ransomware, vulnerability

Credit to Author: Paul Ducklin| Date: Thu, 01 Jun 2023 16:45:58 +0000

Lots to learn, clearly explained in plain English… listen now! (Full transcript inside.)

Read more
Security Sophos 

S3 Ep125: When security hardware has security holes [Audio + Text]

March 9, 2023 0 Comments bust, cisa, Cryptography, Law & order, Naked Security Podcast, Podcast, Ransomware, tpm, vulnerability

Credit to Author: Paul Ducklin| Date: Thu, 09 Mar 2023 18:58:21 +0000

Lastest episode – listen now! (Full transcript inside.)

Read more
Security Sophos 

Serious Security: TPM 2.0 vulns – is your super-secure data at risk?

March 7, 2023 0 Comments Cryptography, tcg, tpm, tpm 2.0, vulnerability, windows 11

Credit to Author: Paul Ducklin| Date: Tue, 07 Mar 2023 17:59:14 +0000

Security bugs in the very code you’ve been told you must have to improve the security of your computer…

Read more
Security Sophos 

DoppelPaymer ransomware supsects arrested in Germany and Ukraine

March 6, 2023 0 Comments bust, cryptocurrency, Cryptography, Cybercrime, DoppelPaymer, europol, grief, Law & order, Ransomware

Credit to Author: Naked Security writer| Date: Mon, 06 Mar 2023 16:16:58 +0000

Devices seized, suspects interrogated and arrested, allegedly connected to devastating cyberattack on University Hospital in Düsseldorf.

Read more
Security Sophos 

S3 Ep124: When so-called security apps go rogue [Audio + Text]

March 2, 2023 0 Comments 2fa, Apple, Cryptography, Cybercrime, data loss, extortion, Google, Hacking, lastpass, Law & order, Naked Security Podcast, Podcast, Ransomware

Credit to Author: Paul Ducklin| Date: Thu, 02 Mar 2023 15:40:41 +0000

Rogue software packages. Rogue “sysadmins”. Rogue keyloggers. Rogue authenticators. Rogue ROGUES!

Read more
  • ← Previous

Recent Posts

  • RFK Jr. Orders HHS to Give Undocumented Migrants’ Medicaid Data to DHS
  • ‘No Kings’ Protests, Citizen-Run ICE Trackers Trigger Intelligence Warnings
  • CBP’s Predator Drone Flights Over LA Are a Dangerous Escalation
  • Here’s What Marines and the National Guard Can (and Can’t) Do at LA Protests
  • How to Protest Safely in the Age of Surveillance

Recent Comments

    Archives

    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019

    Categories

    • BitCoin
    • Blokt
    • ComputerWorld
    • Currency
    • Digital
    • Fortinet
    • Independent
    • Krebs
    • MalwareBytes
    • Microsoft
    • News
    • QuickHeal
    • Science
    • Securiteam
    • Security
    • Sophos
    • Technology
    • TrendMicro
    • Wired
    Copyright © 2025 PossibleThreat Articles. All rights reserved.
    Theme: ColorMag by ThemeGrill. Powered by WordPress.