[Update: I notice that at about the same time that I posted this, Sophos also flagged a blog reporting a somewhat similar fake...
I was quoted last month in an article at PC Retail (http://www.pcr-online.biz/features/305/The-truth-about-cyber-crime), which is nice. However, I just came across the notes I made at...
The Wall Street Journal recently ran an interesting article at http://online.wsj.com/article/SB125487044221969127.html. Of note, was a quote from Los Angeles District Attorney Steve...
ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by...
“Now may I suggest some of the things we must do if we are to make the American dream a reality. First,...
Bonjour mes amis! Well, I am in Switzerland, and very close to the French border, for the Virus Bulletin conference – perhaps...
Modern cars are designed with crumple zones. These crumple zones help to decrease the risk of death in a severe car accident....
We’ve just added my paper “The Game of the Name: Malware Naming, Shape Shifters and Sympathetic Magic” to the White Papers page. This...
Randy’s post yesterday about putting an “In Case of Emergency” (ICE) prefix in front of one or more entries in the contact...
ICE stands for “In Case of Emergency”. The idea is that you put ICE in front of the contact(s) on your phone...
I’m often exasperated by blinkered mindsets in the Mac community, of the security-related kind that Randy highlighted in a recent blog. You might have...
There is an interesting and humorous work of fiction at http://www.appleinsider.com/articles/09/09/07/inside_mac_os_x_snow_leopard_malware_protection.html. Humorous as long as you don’t believe it! The article starts...
I was speaking with our friend David Perry at Trend Micro about the insecurity of social networking services and what steps users...
An interesting comment was made to my last blog on Snow Leopard, Mac malware and all that. I’ve approved the comment, but...
I forwarded this to myself from another account yesterday because I thought it was one of the laziest 419 scam messages I’d...
Mac User has reported in a little more detail than I’ve seen elsewhere so far on the Trojan detection in Snow Leopard,...
I really ought to be working towards some really urgent deadlines, but I can’t resist a quick comment on the antimalware detection...
I feel like the learned judge in the ’60s who asked, in the course of a trial, “What is a Beatle?” since...
Mac security firm Intego blogged about Apple’s decision to include an antimalware component in Mac OS X 10.6 "Snow Leopard" and we...
A number of new papers have been added to the white papers page: Cristian Borghello’s “Playing Dirty” is a translation of his...
North Korean Hackers Target Brazilian Fintech with Sophisticated Phishing Tactics
New Attack Technique ‘Sleepy Pickle’ Targets Machine Learning Models
Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware
Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS
Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day
New Cross-Platform Malware ‘Noodle RAT’ Targets Windows and Linux Systems
Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters
Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw
New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers
China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally
Microsoft Issues Patches for 51 Flaws, Including Critical MSMQ Vulnerability
Chinese Actor SecShow Conducts Massive DNS Probing on Global Scale
China-Linked ValleyRAT Malware Resurfaces with Advanced Data Theft Tactics
Snowflake Breach Exposes 165 Customers’ Data in Ongoing Extortion Campaign
Sticky Werewolf Expands Cyber Attack Targets in Russia and Belarus
New PHP Vulnerability Exposes Windows Servers to Remote Code Execution
Microsoft Revamps Controversial AI-Powered Recall Feature Amid Privacy Concerns
Ultimate Cyber Hygiene Guide: Learn How to Simplify Your Security Efforts
LightSpy Spyware’s macOS Variant Found with Advanced Surveillance Capabilities
FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims