It occurs to me that I should make it clear that this “top ten” isn’t in any particular order. Like the other...
Don’t expect antivirus alone to protect you from everything. Use additional measures such as a personal firewall, antispam and anti-phishing toolbars, but...
If sensitive information is stored on your hard drive (and if you don’t have -something- worth protecting on your system, you’re probably...
[Update info moved to new blog post on 6th January] In deference to all those old enough to get a panic attack...
Speaking of SANS, the Internet Storm Center has more than once talked about problems with digital photo frames, and at Xmas did...
Don’t disclose sensitive information on public websites like FaceBook or LinkedIn. Even information that in itself is innocuous can be combined with...
Don’t trust unsolicited files or embedded links, even from friends. It’s easy to spoof email addresses, for instance, so that email appears...
Log on to your computer with an account that doesn’t have “Administrator” privileges, to reduce the likelihood and severity of damage from...
Further to my post of 25th December about the withdrawal of the CastleCops services, there’s a blog at Darkreading that includes more...
Lots of fuss was made about the paper presented at the Chaos Communication Congress in Berlin yesterday by Alexander Sotirov et al....
Here’s the second instalment of the “ten ways to dodge cyberbullets” that I promised you. Keep applications and operating system components up-to-date...
We’re closing in on the end of 2008 and about to start 7D9, or 2009 for those who do not speak hex....
Yesterday, we started to receive reports of emails pretending to carry links to holiday cards. These emails contain a link that points...
I promised you some more thoughts on the AVAR conference. Randy Abrams and I put together a paper on user education for...
Perhaps the most impersonated person in the world is Santa Claus. For Santa, Identity theft isn’t a problem, but for millions of...
An article on internetnews.com today caught my eye. “In Search of Smarter Phones” http://www.internetnews.com/bus-news/article.php/3788456 tells of capabilities being added to smart phones and...
When I get a chain letter like this, I don't usually respond to everyone else who received it, even when it's a...
The election may be over, but the bad guys are still milking it, and there are lessons to be learned. I guess...
In "Viruses Revealed", Robert Slade and I said that ""In many ways, the Internet Worm is the story of data security in...
After having used the Google Chrome internet browser for a while now, I can say that it is generally a pretty nice...
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
New Threat Actor ‘Void Arachne’ Targets Chinese Users with Malicious VPN Installers
Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
NiceRAT Malware Targets South Korean Users via Cracked Software
Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks
ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws
North Korean Hackers Target Brazilian Fintech with Sophisticated Phishing Tactics