Graham Cluley

Graham Cluley

Independent security analyst


Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon’s. He has given talks about computer security for some of the world’s largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. In 2011 he was inducted into the InfoSecurity Europe Hall of Fame. Follow him on Twitter at @gcluley

217 articles by Graham Cluley

TorrentLocker: Racketeering ransomware disassembled by ESET experts

TorrentLocker: Racketeering ransomware disassembled by ESET experts

TorrentLocker: Racketeering ransomware disassembled by ESET experts

Security experts at ESET have released their latest research into the notorious TorrentLocker malware, which has infected thousands of computer systems around the world, taking data hostage and demanding a ransom be paid to ensure its safe return.

Graham Cluley16 Dec 20142 min. read


White House hit by "sustained" cyber attack, hackers breach unclassified network

White House hit by "sustained" cyber attack, hackers breach unclassified network

White House hit by "sustained" cyber attack, hackers breach unclassified network

IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?

Graham Cluley29 Oct 20144 min. read


Could hackers give you a heart attack or drugs overdose?

Could hackers give you a heart attack or drugs overdose?

Could hackers give you a heart attack or drugs overdose?

There is growing concern that in the rush to embrace technology to save and improve the lives of patients, medical scientists may have forgotten something important: security.

Graham Cluley24 Oct 20143 min. read


iCloud users in China under attack. But who could be after their passwords?

iCloud users in China under attack. But who could be after their passwords?

iCloud users in China under attack. But who could be after their passwords?

Make sure you are running a half-decent browser, don't ignore browser security warnings, and enable two-factor authentication. That appears to be the lesson to learn from the latest attack on Chinese internet users.

Graham Cluley22 Oct 20143 min. read


Yahoo told to "pull your pants up" after Shellshock hack claims

Yahoo told to "pull your pants up" after Shellshock hack claims

Yahoo told to "pull your pants up" after Shellshock hack claims

Yesterday, security researcher Jonathan Hall, of a company called Future South Technologies, accused Yahoo of having suffered a serious security breach via the recently discovered Shellshock vulnerability in Bash.

Graham Cluley08 Oct 20144 min. read


How George Clooney made sure phone hackers didn't ruin his wedding

How George Clooney made sure phone hackers didn't ruin his wedding

How George Clooney made sure phone hackers didn't ruin his wedding

Newly weds George Clooney and Amal Alamuddin supplied guests with "burner phones" to prevent photographs from falling into the hands of hackers and the tabloid press.

Graham Cluley29 Sep 20143 min. read


Facebook to start charging $2.99/month? It's nonsense!

Facebook to start charging $2.99/month? It's nonsense!

Facebook to start charging $2.99/month? It's nonsense!

Thousands of Facebook addicts are feverishly sharing a "news report" claiming that from November 1st you'll be paying $2.99 every month to access the site.

Graham Cluley22 Sep 20143 min. read


How to change Safari's default search engine in iOS 8 for greater privacy

How to change Safari's default search engine in iOS 8 for greater privacy

How to change Safari's default search engine in iOS 8 for greater privacy

With iOS 8, you can - for the first time - switch your Safari browser's search engine to alternatives such as DuckDuckGo. Find out why you might want to and, in fairness, why you might NOT want to...

Graham Cluley18 Sep 20143 min. read


Beware overdue invoice malware attack, wrapped in an .ARJ file!

Beware overdue invoice malware attack, wrapped in an .ARJ file!

Beware overdue invoice malware attack, wrapped in an .ARJ file!

Online criminals are spamming out messages claiming that invoices are overdue. But attached to the emails are .ARJ files containing a malicious payload - don't allow your computer to become infected.

Graham Cluley15 Sep 20142 min. read