Team Cymru’s View on Hello Barbie
Team Cymru's take on the Hello Barbie story The post Team Cymru’s View on Hello Barbie appeared first on ITsecurity.
View ArticleSupport Scams: Talos Takes Note
A blog article by Talos on support scams is a useful addition to the body of work on such scams and scammers that already exists. The post Support Scams: Talos Takes Note appeared first on ITsecurity.
View ArticleFacing Up to Facebook
Not a Facebook user? Don't be so sure: there's logging in, and there's an 'untrusted login'. Apparently. The post Facing Up to Facebook appeared first on ITsecurity.
View ArticleStuxnet: Sprinting for the Finnish
Who would expect a flippant 'conspiracy theory' to survive so long? I just hope it isn't going to morph into a hoax. The post Stuxnet: Sprinting for the Finnish appeared first on ITsecurity.
View ArticleWindows – still here despite the breakages
Windows 1.0 - the start of an oddity. Sorry, odyssey. Something gained, something lost. The post Windows – still here despite the breakages appeared first on ITsecurity.
View ArticleTech Support Scams: a Beginner’s Guide
Support scams are changing: what do everyday computer users need to know to lessen the risk of being scammed? The post Tech Support Scams: a Beginner’s Guide appeared first on ITsecurity.
View ArticleTerrorist Attacks, Hoaxes and Malware
Hoaxes about terrorist attacks in the UK: just hoaxes, or delivering malware? The post Terrorist Attacks, Hoaxes and Malware appeared first on ITsecurity.
View ArticleCyberchoices and the Price of Expertise
Cyberchoices: why turn to crime when security consultancy pays so well? The post Cyberchoices and the Price of Expertise appeared first on ITsecurity.
View ArticleCounting Malware & Running Out of Fingers
Is there less new malware, or are we being encouraged by marketing to mistake counting malware regardless of classification as a way of choosing a product? The post Counting Malware & Running Out...
View ArticleIcebergs and Security Predictions
It’s traditional at this time of year for security researchers to risk their credibility by offering their predictions as to what will happen in information security in the next 12 months. Usually in...
View ArticleTech Support Scams: is Dell Compromised?
How come tech support scammers claiming to be from Dell have so much information about the Dell customers they're calling? The post Tech Support Scams: is Dell Compromised? appeared first on ITsecurity.
View ArticleThe Hippocratic Oath and the Internet of Things
A modern Hippocratic Oath that takes seriously the security implications when the Internet of Things meets medical technology. The post The Hippocratic Oath and the Internet of Things appeared first on...
View ArticlePredictable Predictions and IoT
Should you worry about IoT security quite so much as the media suggest? The post Predictable Predictions and IoT appeared first on ITsecurity.
View ArticleWipro Wipeout? Call Centres and Scams
Arrests of call centre staff and some scam call variations cause TalkTalk to reconsider its relationship with Wipro. The post Wipro Wipeout? Call Centres and Scams appeared first on ITsecurity.
View ArticleMalicious Photocopier: not the Internet of Things
If your photocopier is sending you Word docs by email, think twice before opening. The post Malicious Photocopier: not the Internet of Things appeared first on ITsecurity.
View ArticleSan Bernardino: what does the security industry think?
While Apple's head is above the parapet over the San Bernardino forensic issue, the security industry (mostly) offers subdued support. The post San Bernardino: what does the security industry think?...
View ArticleInternet of Things? *All I want is a proper cup of coffee…
Does everything have to be attached to the Internet of Things? The post Internet of Things? *All I want is a proper cup of coffee… appeared first on ITsecurity.
View ArticleBuzzwords and Booth Bunnies
RSA: looking for ideas that are really going to make a difference, rather than old ideas disguised as new buzzwords? The post Buzzwords and Booth Bunnies appeared first on ITsecurity.
View ArticleVirus hoaxes still thrive while ‘Sonia disowns Rahul’
Sonia may have disowned Rahul, but virus hoaxes are still with us, though nowadays more often found in social media than in email. The post Virus hoaxes still thrive while ‘Sonia disowns Rahul’...
View ArticlePatches (and Vulnerabilities, and Exploits)
Exploits, vulnerabilities, why patches really do matter, and thoughts on how to live with them. The post Patches (and Vulnerabilities, and Exploits) appeared first on ITsecurity.
View Article