Almost every significant data breach starts by compromising an end-point device. And the easiest way to do that is to steal some user credentials. It's why the theft of credentials from Yahoo!, Ashley Madison and other large companies are such a big deal. Many people use the same usernames and passwords on multiple sites. But what if your access to a site was governed by something other than a username and password? This is where the YubiKey fits in.
Who doesn't love hearing news that a new vulnerability in one of their computer's key components—the CPU that powers the whole thing—could allow an attacker to steal critical data (like your passwords or your encryption keys) directly from your processor? It's always a fun day when that happens. Thankfully, the fixes for Intel's recently announced vulnerability—yes, it's Intel again—couldn't be easier.
Police hunting for victims of a suspected serial killer stalking the Mediterranean island nation of Cyprus have pulled a suitcase containing the decomposing remains of a woman from the bottom of a toxic, man-made lake.