Randy’s post yesterday about putting an “In Case of Emergency” (ICE) prefix in front of one or more entries in the contact...
ICE stands for “In Case of Emergency”. The idea is that you put ICE in front of the contact(s) on your phone...
I’m often exasperated by blinkered mindsets in the Mac community, of the security-related kind that Randy highlighted in a recent blog. You might have...
There is an interesting and humorous work of fiction at http://www.appleinsider.com/articles/09/09/07/inside_mac_os_x_snow_leopard_malware_protection.html. Humorous as long as you don’t believe it! The article starts...
I was speaking with our friend David Perry at Trend Micro about the insecurity of social networking services and what steps users...
An interesting comment was made to my last blog on Snow Leopard, Mac malware and all that. I’ve approved the comment, but...
I forwarded this to myself from another account yesterday because I thought it was one of the laziest 419 scam messages I’d...
Mac User has reported in a little more detail than I’ve seen elsewhere so far on the Trojan detection in Snow Leopard,...
I really ought to be working towards some really urgent deadlines, but I can’t resist a quick comment on the antimalware detection...
I feel like the learned judge in the ’60s who asked, in the course of a trial, “What is a Beatle?” since...
Mac security firm Intego blogged about Apple’s decision to include an antimalware component in Mac OS X 10.6 "Snow Leopard" and we...
A number of new papers have been added to the white papers page: Cristian Borghello’s “Playing Dirty” is a translation of his...
This is part two of a recent email interview with a Turkish web site, with part one made available here for the...
Regular readers will be aware that, unlike many people in the security industry, people in this research team tend to be enthusiastic...
So, back in harness. I’ve been away for a couple of weeks: not on holiday as such, though I did take some...
Perhaps I imagined it, but a few days ago when I allowed Firefox to update to fix security vulnerabilities my privacy settings...
As I previously pointed out http://www.eset.com/threat-center/blog/2009/08/04/calling-adobe%E2%80%99s-bluff, Adobe is at best deceptive about claims of the security and privacy of Flash. Even if...
There’s been a certain amount of buzz in the past couple of days about messages claiming to link to Wire Transfer information,...
We’ve had reassuring responses from Slideshare about the recent problem with a malicious slide deck and the company’s timely removal of the...
You probably aren’t looking for trouble, but there’s a good chance you’ll find it when you search the internet. An article in...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment