Tips & advice


3185 articles

Malware

Malware is called malicious for a reason: the risks of weaponizing code

Malware is called malicious for a reason: the risks of weaponizing code

Malware

Malware is called malicious for a reason: the risks of weaponizing code

The risks of using government use of malicious code in cyber conflict are examined in this paper by Andrew Lee and Stephen Cobb: Malware is called malicious for a reason: the risks of weaponizing code.

Stephen Cobb01 Aug 2014


Malware

Homeland Security warns of new Point of Sale attacks

Homeland Security warns of new Point of Sale attacks

Malware

Homeland Security warns of new Point of Sale attacks

New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.

Lysa Myers01 Aug 2014


Malware, Scams, Cybercrime

Week in Security: Tor in turmoil, USB ports in a storm, Android app attack

Week in Security: Tor in turmoil, USB ports in a storm, Android app attack

Malware, Scams, Cybercrime

Week in Security: Tor in turmoil, USB ports in a storm, Android app attack

This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.

Rob Waugh01 Aug 2014


Privacy

Tor 'unmasked' - but who is at risk?

Tor 'unmasked' - but who is at risk?

Privacy

Tor 'unmasked' - but who is at risk?

Users of the online privacy service Tor - designed to allow users to access hidden sites anonymously - may have been unmasked after an attack lasting five months, crafted to de-anonymise traffic on the service.

Rob Waugh31 Jul 2014


Malware

Malware: Every USB port is "defenseless" against new scam

Malware: Every USB port is "defenseless" against new scam

Malware

Malware: Every USB port is "defenseless" against new scam

The billions of USB ports in use in PCs are vulnerable to a new attack - which can undetectably install malware, steal data and seize control of machines.

Rob Waugh31 Jul 2014


Internet of Things

Internet of things - tests show almost all devices “riddled” with flaws

Internet of things - tests show almost all devices “riddled” with flaws

Internet of Things

Internet of things - tests show almost all devices “riddled” with flaws

A new report found hundreds of serious security flaws in some of the most popular Internet of Things gadgets - the problem is far deeper than thought, with 70% of the most popular such gadgets having serious security flaws.

Rob Waugh30 Jul 2014


Privacy

Microsoft denies it has ever been asked to plant a snooping backdoor into its products

Microsoft denies it has ever been asked to plant a snooping backdoor into its products

Privacy

Microsoft denies it has ever been asked to plant a snooping backdoor into its products

If intelligence and law enforcement agencies have a genuine need to spy upon some communications then it should not be via a backdoor that could put millions of innocent, law-abiding users at risk.

Graham Cluley28 Jul 2014


Scams

Identity fraud: How one email wiped out $300m - and sender walked free

Identity fraud: How one email wiped out $300m - and sender walked free

Scams

Identity fraud: How one email wiped out $300m - and sender walked free

A single email wiped $300 million off the value of an Australian mining company, after an environmental activist, Jonathan Moylan and sent a press release to media organizations.

Rob Waugh28 Jul 2014


Cybercrime

Sony hacked: Victims to get $15m in ‘quality’ games – some day

Sony hacked: Victims to get $15m in ‘quality’ games – some day

Cybercrime

Sony hacked: Victims to get $15m in ‘quality’ games – some day

Victims of the notorious attack against Sony’s online gaming service and associated websites in 2011, which exposed details for up to 77 million subscribers, are to be offered $15m in digital goods as compensation.

Rob Waugh28 Jul 2014