Many people in the US associate HIPAA with the rules required to protect medical data. It actually is a lot more than...
I know, the Twitter hack is old news, but poor passwords are still common. It is a pity because it really is...
Nigel Morris, of the UK’s “Independent” newspaper reported recently on new powers given to police in the UK and proposals to extend...
And finally… Don’t use cracked/pirated software! These are easy avenues for introducing malware into, or exploiting weaknesses in, a system. This also...
It occurs to me that I should make it clear that this “top ten” isn’t in any particular order. Like the other...
Don’t expect antivirus alone to protect you from everything. Use additional measures such as a personal firewall, antispam and anti-phishing toolbars, but...
If sensitive information is stored on your hard drive (and if you don’t have -something- worth protecting on your system, you’re probably...
[Update info moved to new blog post on 6th January] In deference to all those old enough to get a panic attack...
Speaking of SANS, the Internet Storm Center has more than once talked about problems with digital photo frames, and at Xmas did...
Don’t disclose sensitive information on public websites like FaceBook or LinkedIn. Even information that in itself is innocuous can be combined with...
Don’t trust unsolicited files or embedded links, even from friends. It’s easy to spoof email addresses, for instance, so that email appears...
Log on to your computer with an account that doesn’t have “Administrator” privileges, to reduce the likelihood and severity of damage from...
Further to my post of 25th December about the withdrawal of the CastleCops services, there’s a blog at Darkreading that includes more...
Lots of fuss was made about the paper presented at the Chaos Communication Congress in Berlin yesterday by Alexander Sotirov et al....
Here’s the second instalment of the “ten ways to dodge cyberbullets” that I promised you. Keep applications and operating system components up-to-date...
We’re closing in on the end of 2008 and about to start 7D9, or 2009 for those who do not speak hex....
Yesterday, we started to receive reports of emails pretending to carry links to holiday cards. These emails contain a link that points...
I promised you some more thoughts on the AVAR conference. Randy Abrams and I put together a paper on user education for...
Perhaps the most impersonated person in the world is Santa Claus. For Santa, Identity theft isn’t a problem, but for millions of...
An article on internetnews.com today caught my eye. “In Search of Smarter Phones” http://www.internetnews.com/bus-news/article.php/3788456 tells of capabilities being added to smart phones and...
Researchers Uncover Connection b/w Moses Staff and Emerging Abraham’s Ax Hacktivists Group
North Korean Hackers Turn to Credential Harvesting in Latest Wave of Cyberattacks
LastPass Parent Company GoTo Suffers Data Breach, Customers’ Backups Compromised
Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
Emotet Malware Makes a Comeback with New Evasion Techniques
Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud
Exploit code for ManageEngine RCE flaw published. Patch immediately
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers’ DNS Settings
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
New Microsoft Azure Vulnerability Uncovered — EmojiDeploy for RCE Attacks
Android Users Beware: New Hook Malware with RAT Capabilities Emerges
New Research Delves into the World of Malicious LNK Files and Hackers Behind Them
Bitzlato Crypto Exchange Founder Arrested for Aiding Cybercriminals
Mailchimp Suffers Another Security Breach Compromising Some Customers’ Information
Mailchimp hacked again in 6 months. One more reason of not using MailChimp email marketing platform
Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
Git Users Urged to Update Software to Prevent Remote Code Execution Attacks
Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware
Zoho ManageEngine PoC Exploit to be Released Soon – Patch Before It’s Too Late!