Tips & advice


3185 articles

Malware

"More trouble" brewing as mobile threats multiply "exponentially", ex-ISACA chief warns

"More trouble" brewing as mobile threats multiply "exponentially", ex-ISACA chief warns

Malware

"More trouble" brewing as mobile threats multiply "exponentially", ex-ISACA chief warns

Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.

Rob Waugh18 Sep 2013


Malware

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Malware

Microsoft rushes out emergency fix for Internet Explorer after “targeted attacks”

Microsoft has released an emergency fix for a vulnerability in all versions of Internet Explorer - warning that targeted attacks are already attempting to exploit it.

Rob Waugh18 Sep 2013


Cybercrime

Fake card reader "texts" PINs to thieves instantly - and drains bank accounts in three hours

Fake card reader "texts" PINs to thieves instantly - and drains bank accounts in three hours

Cybercrime

Fake card reader "texts" PINs to thieves instantly - and drains bank accounts in three hours

A hacked card reader - similar to the ones used in shops and restaurants - is on sale on Russian forums for $2,000, and can "text" details including PIN numbers to cybercriminals, who empty bank accounts in three hours using teams of money-launderers.

Rob Waugh17 Sep 2013


Malware

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

Malware

“Chemical Trojans” baked into circuits could offer invisible way to steal secrets

“Hardware Trojans” could be baked invisibly into circuits by attackers, allowing them to grab secret keys from computer components without fear of detection - even by advanced inspection systems using optical microscopes.

Rob Waugh17 Sep 2013


How To

Remote Desktop (RDP) Hacking 101: I can see your desktop from here!

Remote Desktop (RDP) Hacking 101: I can see your desktop from here!

How To

Remote Desktop (RDP) Hacking 101: I can see your desktop from here!

With malicious remote access attacks of the rise it is time to check your computer's RDP configuration and apply restrictions, like turning it off, limiting users, and applying strong passwords

Cameron Camp16 Sep 2013


Malware, Scams

A dream job at a luxury store? Nope - just a clever $1.5 million phishing scam

A dream job at a luxury store? Nope - just a clever $1.5 million phishing scam

Malware, Scams

A dream job at a luxury store? Nope - just a clever $1.5 million phishing scam

Six Nigerian men have gone on trial today in London for an alleged phishing scam where job offers at London’s exclusive Harrods department store were used as “bait”.

Rob Waugh16 Sep 2013


Malware

Tibet-targeting Mac OS malware rears its head again

Tibet-targeting Mac OS malware rears its head again

Malware

Tibet-targeting Mac OS malware rears its head again

A new variant on a family of Mac OS X malware which targets Tibetan activists has been found in the wild and shared on the Virus Total website, where security researchers show off new “finds”.

Rob Waugh13 Sep 2013


Cybercrime

Phishing warning after Vodafone hack leaks personal information for 2 million customers

Phishing warning after Vodafone hack leaks personal information for 2 million customers

Cybercrime

Phishing warning after Vodafone hack leaks personal information for 2 million customers

A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.

Rob Waugh12 Sep 2013


How To

A scam-spotters guide: Ten things your bank will NEVER do - but cybercriminals will

A scam-spotters guide: Ten things your bank will NEVER do - but cybercriminals will

How To

A scam-spotters guide: Ten things your bank will NEVER do - but cybercriminals will

These days cybercriminals will use phone calls, SMS messages, emails, fake apps - and even couriers - in an effort to get your money. The key to staying safe is to recognize behavior that isn’t quite “right” - and catch phishers and fraudsters in the act.

Rob Waugh12 Sep 2013