There's a news item out at the moment about how a French man has been arrested for a host of Twitter account...
A flurry of long-overdue government initiatives designed to address cybercrime has begun to actually develop some momentum. When I consider that it...
Two weeks ago I acted as a panelist in a panel discussion at an IT Security conference in Kuala Lumpur. I was...
Engineers are really smart people who often know how to make something with no real world effectiveness work really well without effect....
Back on the 22nd of February, I wrote an entry on this blog called "Does Anybody Know WHOIS Out There?". This entry...
The Apple iPad is the current gadget du jour amongst the digerati and has been seeing strong presales, with estimates as high...
The Anti-Phishing Working Group has asked its members to publicize the forthcoming Counter eCrime Operations Summit in Brazil, which I'm pleased to...
[Update: so far I have two votes for dumb. Maybe I'm giving this spammer too much credit, and it is a simple...
It has been a year since we last discussed fraudulent domain name registrar scams and we wanted to let people know that...
Greetings, friends and fiends. It's been a while since I've been able to blog: I've been trying out one of these vacation...
We have recently seen some reports that give some idea of the real size of the cybercrime problem. Recently Federal Deposit Insurance...
Ford Motor Company has recently announced that later this year it will be producing cars with built-in WiFi capabilities. Since 2008, the...
Let's consider the words of the song "I'll Never Fall In Love" by Burt Bacharach and Hal David: "What do you get...
While serving in the Marine Corps, one activity that I felt was effective in preparing both myself and my unit to be...
Perhaps you have seen the recent buzz around Google Buzz. The fact is that Google has decided that anything it knows about...
According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t...
Recently Eric Schmidt, the CEO of Google, said in an interview “If you have something that you don’t want anyone to know,...
[Part 7 of an occasional series, updating a blog series I ran in early 2009 to reflect changes in the threat landscape. This...
No, I'm not talking about a newly-discovered and virulent OS X upconversion of SevenDust or AutoStart 9805. Mac Virus is a site...
Wow, I knew it was a problem, but the scope is mind-boggling. At least one of you out there is probably making...
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
New Threat Actor ‘Void Arachne’ Targets Chinese Users with Malicious VPN Installers
Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
NiceRAT Malware Targets South Korean Users via Cracked Software
Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks