Well, this actually isn’t a lie, but a lot of what you read on the web are lies designed to steal money...
…no promise of chicks for free, but I did get spam this morning offering me a “Free-Trial kit” for some scheme for...
You may have noticed that I’ve been making a lot of references to this over the past few weeks. You can now...
Today is inauguration day in the USA. As I traveled to many countries late last year I was amazed at how joyous...
The top ten (twenty, twenty-five…) season doesn’t seem to have finished yet: the latest to cross my radar was something like seven...
You might have noticed that Conficker (Downadup) is actually standing up rather well to all the attention it’s receiving at the moment....
CNN reported that there a new sleeper virus out there. http://www.cnn.com/2009/TECH/ptech/01/16/virus.downadup/index.html There is nothing sleepy about the Conficker worm, it is wide...
One of the security best practices is to back up your data regularly. This is sound advice as it helps mitigate the...
There are different techniques that can be used by a program to identify in which country it has been installed. It can...
This is bizarre, if slightly nostalgic. I spent a lot of time in the first half of this decade writing and presenting...
Many people in the US associate HIPAA with the rules required to protect medical data. It actually is a lot more than...
I know, the Twitter hack is old news, but poor passwords are still common. It is a pity because it really is...
Nigel Morris, of the UK’s “Independent” newspaper reported recently on new powers given to police in the UK and proposals to extend...
And finally… Don’t use cracked/pirated software! These are easy avenues for introducing malware into, or exploiting weaknesses in, a system. This also...
It occurs to me that I should make it clear that this “top ten” isn’t in any particular order. Like the other...
Don’t expect antivirus alone to protect you from everything. Use additional measures such as a personal firewall, antispam and anti-phishing toolbars, but...
If sensitive information is stored on your hard drive (and if you don’t have -something- worth protecting on your system, you’re probably...
[Update info moved to new blog post on 6th January] In deference to all those old enough to get a panic attack...
Speaking of SANS, the Internet Storm Center has more than once talked about problems with digital photo frames, and at Xmas did...
Don’t disclose sensitive information on public websites like FaceBook or LinkedIn. Even information that in itself is innocuous can be combined with...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
When is One Vulnerability Scanner Not Enough?
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
How to Make Your Employees Your First Line of Cyber Defense
ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan