Tips & advice


3182 articles

Privacy

Trends 2018: Personal data

Trends 2018: Personal data

Privacy

Trends 2018: Personal data

The new age of technology and legislation brings safety concerns for your personal data

Tony Anscombe18 Jan 2018


Scams

Scammers and jobhunters

Scammers and jobhunters

Scams

Scammers and jobhunters

It's easier to have scruples about how you earn your living when you're not one of millions of people chasing just a few thousand jobs.

David Harley16 Jan 2018


Cybercrime

Fruitfly malware spied on Mac users for 13 years - man charged

Fruitfly malware spied on Mac users for 13 years - man charged

Cybercrime

Fruitfly malware spied on Mac users for 13 years - man charged

US authorities have charged a 28-year-old Ohio man who is alleged to have created and installed creepy spyware on thousands of computers for 13 years.

Graham Cluley13 Jan 2018


Cybercrime

Tank-traps versus trappings in virtual currencies: A cybersecurity minefield

Tank-traps versus trappings in virtual currencies: A cybersecurity minefield

Cybercrime

Tank-traps versus trappings in virtual currencies: A cybersecurity minefield

Bitcoin, the progenitor of the entire cryptocurrency boom and still the most popular virtual currency, experienced a truly heady run-up in value. Its price surge was punctuated with a crescendo midway through December, when a single bitcoin approached $20,000.

Tomáš Foltýn10 Jan 2018


Internet of Things

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

Internet of Things

MADIoT – The nightmare after XMAS (and Meltdown, and Spectre)

It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%.

Righard Zwienenberg08 Jan 2018


Digital Security

Meltdown and Spectre CPU Vulnerabilities: What You Need to Know

Meltdown and Spectre CPU Vulnerabilities: What You Need to Know

Digital Security

Meltdown and Spectre CPU Vulnerabilities: What You Need to Know

The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel's Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.

Aryeh Goretsky05 Jan 2018


Digital Security

Now is the best time to craft your breach response

Now is the best time to craft your breach response

Digital Security

Now is the best time to craft your breach response

Taking time to think logically and deliberately about your assets can help you determine what needs to be secured. Preparing for the worst can help you see the best course of action to prevent those emergencies in the present.

Lysa Myers03 Jan 2018


Digital Security

Cybersecurity review of 2017: The year of wake-up calls – part 2

Cybersecurity review of 2017: The year of wake-up calls – part 2

Digital Security

Cybersecurity review of 2017: The year of wake-up calls – part 2

Courtesy of its highly customizable nature – along with its ability to persist in the system and to provide valuable information for fine-tuning the highly configurable payloads – the malware can be adapted for attacks against any environment, making it extremely dangerous.

Tomáš Foltýn28 Dec 2017


Digital Security

Cybersecurity review of 2017: The year of wake-up calls - part 1

Cybersecurity review of 2017: The year of wake-up calls - part 1

Digital Security

Cybersecurity review of 2017: The year of wake-up calls - part 1

Ransomware and data breaches remain major thorns in the sides of users and organizations across the world, often piercing their defenses without too much effort.

Tomáš Foltýn27 Dec 2017