Tips & advice


3182 articles

Cybercrime

ISF predicts increasing impact of data breaches next year

ISF predicts increasing impact of data breaches next year

Cybercrime

ISF predicts increasing impact of data breaches next year

The association expects the increased costs incurred in security breaches to come both from traditional areas, such as network cleanup and customer notification, and newer areas such as litigation.

Tomáš Foltýn05 Dec 2017


Digital Security

NHS’s cyber-defenses to get a £20 million shot in the arm

NHS’s cyber-defenses to get a £20 million shot in the arm

Digital Security

NHS’s cyber-defenses to get a £20 million shot in the arm

The health service is now on the lookout for a partner to help run the project, having invited interested parties to tender for a contract that is set to run for three to five years. The new center is set to be based in the English city of Leeds.

Tomáš Foltýn01 Dec 2017


Cybercrime

Shipping giant refuses to pay hackers ransom after data stolen

Shipping giant refuses to pay hackers ransom after data stolen

Cybercrime

Shipping giant refuses to pay hackers ransom after data stolen

Clarksons, the global shipping firm, has turned the tables on criminal hackers who attempted to extort a ransom payment after stealing confidential information from the company's network.

Graham Cluley30 Nov 2017


Malware

ESET malware researchers awarded prize in open-source memory forensics competition

ESET malware researchers awarded prize in open-source memory forensics competition

Malware

ESET malware researchers awarded prize in open-source memory forensics competition

The Volatility Foundation, the non-profit organization behind the Volatility Framework, sponsors the yearly Volatility Plugin Contest to acknowledge the best forensic tools built on the Volatility platform.

Editor29 Nov 2017


Cybercrime

Keyless convenience or security risk? Car theft in action

Keyless convenience or security risk? Car theft in action

Cybercrime

Keyless convenience or security risk? Car theft in action

Exactly how does the attack work and is it expensive to create? The attack, while seeming to be technology voodoo, is actually rather simple. It requires a transmitting relay near the key and a second relay near the car to receive the relayed signals and mimic the key.

Tony Anscombe29 Nov 2017


Cybercrime

Imgur hackers stole 1.7 million email addresses and passwords

Imgur hackers stole 1.7 million email addresses and passwords

Cybercrime

Imgur hackers stole 1.7 million email addresses and passwords

Image-hosting website Imgur discovered at the end of last week that hackers broke into its systems in 2014, and stole the account details of some 1.7 million registered users.

Graham Cluley27 Nov 2017


Digital Security

Busy Browsers attract Black Friday Burglars

Busy Browsers attract Black Friday Burglars

Digital Security

Busy Browsers attract Black Friday Burglars

Just as in past decades when cash drawers and bank vaults were targeted for theft, today’s e-shops and online banks have fallen under the scope of cybercriminals. Their “digital-focus” is just an evolutionary step beyond robbing stagecoaches in the Wild West, and banks in the 20th century.

Editor24 Nov 2017


Cybercrime

US indicts alleged culprit of HBO hack-and-extort campaign

US indicts alleged culprit of HBO hack-and-extort campaign

Cybercrime

US indicts alleged culprit of HBO hack-and-extort campaign

Between approximately July 23 and 29, Mesri reportedly engaged in his blackmail campaign. After the TV network didn’t pay the required $6 million in digital cryptocurrency, he began leaking portions of the stolen data on July 30.

Tomáš Foltýn23 Nov 2017


ESET Research, Mobile Security

New campaigns spread banking malware through Google Play

New campaigns spread banking malware through Google Play

ESET Research, Mobile Security

New campaigns spread banking malware through Google Play

For a user, it can be difficult to figure out whether an app is malicious. First off it is always good only to install applications from the Google Play store, since most malware is still mainly spread through alternative stores.

Lukas Stefanko21 Nov 2017