CMF, a budget-friendly sub-brand Nothing announced last August, has officially unveiled a trio of new products. There’s a smartphone, a watch and earbuds, all of which seem to be modest in both price and features. Let’s start with the smartphone. Nothing made a splash with its original smartphone, the Nothing Phone 1, and the appropriately-named […]
Read More →The best streaming devices for 2024 From sticks to dongles to set-top boxes, there are streaming devices for every budget.
July 8, 2024
A streaming device can make a “dumb” TV smart, turning just about any screen with an HDMI port into a TV you can use to watch Netflix, Peacock, Max, a live TV streaming service like YouTubeTV, or any other streaming app you subscribe to. If you already have a smart TV and don’t care for […]
Read More →Deconstructing Security Assumptions to Ensure Future Resilience Deconstructing Security Assumptions to Ensure Future Resilience
July 8, 2024
COMMENTARY Second of two parts. (Read Part 1: "Stress-Testing Our Security Assumptions in a World of New & Novel Risks.") Achieving security in a future of "unseen until it's too late" threats forces us to look beyond the endless cycles of discover and patch, identify and neutralize, and sense and respond, to build resilience by […]
Read More →‘CloudSorcerer’ Leverages Cloud Services in Cyber-Espionage Campaign ‘CloudSorcerer’ Leverages Cloud Services in Cyber-Espionage Campaign
July 8, 2024
A new cyber-espionage actor is targeting government organizations in the Russian Federation with a sophisticated piece of malware that can adapt its behavior based on its execution environment. The advanced persistent threat (APT) group, which researchers at Kaspersky are tracking as "CloudSorcerer," has an operational style that is akin to that used by "CloudWizard" another […]
Read More →10B Passwords Pop Up on Dark Web ‘RockYou2024’ Release 10B Passwords Pop Up on Dark Web ‘RockYou2024’ Release
July 8, 2024
A user has leaked nearly 10 billion unique plaintext passwords on a popular hacking forum, seemingly obtained through several past breaches. The list is coined RockYou2024, due to its file name, rockyou.txt. Researchers say that while the list does have some value for attackers to make a brute-force attack, it's unlikely that any website would […]
Read More →