ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by...
“Now may I suggest some of the things we must do if we are to make the American dream a reality. First,...
Bonjour mes amis! Well, I am in Switzerland, and very close to the French border, for the Virus Bulletin conference – perhaps...
Modern cars are designed with crumple zones. These crumple zones help to decrease the risk of death in a severe car accident....
We’ve just added my paper “The Game of the Name: Malware Naming, Shape Shifters and Sympathetic Magic” to the White Papers page. This...
Randy’s post yesterday about putting an “In Case of Emergency” (ICE) prefix in front of one or more entries in the contact...
ICE stands for “In Case of Emergency”. The idea is that you put ICE in front of the contact(s) on your phone...
I’m often exasperated by blinkered mindsets in the Mac community, of the security-related kind that Randy highlighted in a recent blog. You might have...
There is an interesting and humorous work of fiction at http://www.appleinsider.com/articles/09/09/07/inside_mac_os_x_snow_leopard_malware_protection.html. Humorous as long as you don’t believe it! The article starts...
I was speaking with our friend David Perry at Trend Micro about the insecurity of social networking services and what steps users...
An interesting comment was made to my last blog on Snow Leopard, Mac malware and all that. I’ve approved the comment, but...
I forwarded this to myself from another account yesterday because I thought it was one of the laziest 419 scam messages I’d...
Mac User has reported in a little more detail than I’ve seen elsewhere so far on the Trojan detection in Snow Leopard,...
I really ought to be working towards some really urgent deadlines, but I can’t resist a quick comment on the antimalware detection...
I feel like the learned judge in the ’60s who asked, in the course of a trial, “What is a Beatle?” since...
Mac security firm Intego blogged about Apple’s decision to include an antimalware component in Mac OS X 10.6 "Snow Leopard" and we...
A number of new papers have been added to the white papers page: Cristian Borghello’s “Playing Dirty” is a translation of his...
This is part two of a recent email interview with a Turkish web site, with part one made available here for the...
Regular readers will be aware that, unlike many people in the security industry, people in this research team tend to be enthusiastic...
So, back in harness. I’ve been away for a couple of weeks: not on holiday as such, though I did take some...
Are Your SaaS Backups as Secure as Your Production Data?
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
How to implement Principle of Least Privilege(Cloud Security) in AWS, Azure, and GCP cloud
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions