Specifically spear-phishing, where the target is deliberately selected, as opposed to a random untargeted attack. An article at Dark Reading.com discusses the...
For many years banks and credit card vendors have accepted that there will be some amount of fraud and built those costs...
Oh brother, don’t tell me you fell for that one! All capital letters, lots of exclamation marks, the classic signs of bad...
[Update: I notice that at about the same time that I posted this, Sophos also flagged a blog reporting a somewhat similar fake...
I was quoted last month in an article at PC Retail (http://www.pcr-online.biz/features/305/The-truth-about-cyber-crime), which is nice. However, I just came across the notes I made at...
The Wall Street Journal recently ran an interesting article at http://online.wsj.com/article/SB125487044221969127.html. Of note, was a quote from Los Angeles District Attorney Steve...
ESET released its Global Threat Report for the month of September, 2009, identifying the top ten threats seen during the month by...
“Now may I suggest some of the things we must do if we are to make the American dream a reality. First,...
Bonjour mes amis! Well, I am in Switzerland, and very close to the French border, for the Virus Bulletin conference – perhaps...
Modern cars are designed with crumple zones. These crumple zones help to decrease the risk of death in a severe car accident....
We’ve just added my paper “The Game of the Name: Malware Naming, Shape Shifters and Sympathetic Magic” to the White Papers page. This...
Randy’s post yesterday about putting an “In Case of Emergency” (ICE) prefix in front of one or more entries in the contact...
ICE stands for “In Case of Emergency”. The idea is that you put ICE in front of the contact(s) on your phone...
I’m often exasperated by blinkered mindsets in the Mac community, of the security-related kind that Randy highlighted in a recent blog. You might have...
There is an interesting and humorous work of fiction at http://www.appleinsider.com/articles/09/09/07/inside_mac_os_x_snow_leopard_malware_protection.html. Humorous as long as you don’t believe it! The article starts...
I was speaking with our friend David Perry at Trend Micro about the insecurity of social networking services and what steps users...
An interesting comment was made to my last blog on Snow Leopard, Mac malware and all that. I’ve approved the comment, but...
I forwarded this to myself from another account yesterday because I thought it was one of the laziest 419 scam messages I’d...
Mac User has reported in a little more detail than I’ve seen elsewhere so far on the Trojan detection in Snow Leopard,...
I really ought to be working towards some really urgent deadlines, but I can’t resist a quick comment on the antimalware detection...
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
New Threat Actor ‘Void Arachne’ Targets Chinese Users with Malicious VPN Installers
Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
NiceRAT Malware Targets South Korean Users via Cracked Software
Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks