Don’t trust unsolicited files or embedded links, even from friends. It’s easy to spoof email addresses, for instance, so that email appears...
Log on to your computer with an account that doesn’t have “Administrator” privileges, to reduce the likelihood and severity of damage from...
Further to my post of 25th December about the withdrawal of the CastleCops services, there’s a blog at Darkreading that includes more...
Lots of fuss was made about the paper presented at the Chaos Communication Congress in Berlin yesterday by Alexander Sotirov et al....
Here’s the second instalment of the “ten ways to dodge cyberbullets” that I promised you. Keep applications and operating system components up-to-date...
We’re closing in on the end of 2008 and about to start 7D9, or 2009 for those who do not speak hex....
Yesterday, we started to receive reports of emails pretending to carry links to holiday cards. These emails contain a link that points...
I promised you some more thoughts on the AVAR conference. Randy Abrams and I put together a paper on user education for...
Perhaps the most impersonated person in the world is Santa Claus. For Santa, Identity theft isn’t a problem, but for millions of...
An article on internetnews.com today caught my eye. “In Search of Smarter Phones” http://www.internetnews.com/bus-news/article.php/3788456 tells of capabilities being added to smart phones and...
When I get a chain letter like this, I don't usually respond to everyone else who received it, even when it's a...
The election may be over, but the bad guys are still milking it, and there are lessons to be learned. I guess...
In "Viruses Revealed", Robert Slade and I said that ""In many ways, the Internet Worm is the story of data security in...
After having used the Google Chrome internet browser for a while now, I can say that it is generally a pretty nice...
Last week, we had reports of a number of web sites being hacked and used to distribute malicious software. The web sites...