Category Archives: all posts

Shhh! Alexa can hear you

      Comments Off on Shhh! Alexa can hear you

Is your friendly Amazon Echo serving your every whim and need – or is it spying on you? A British researcher has found a simple way of using malware and an SD card to convert an innocent speaker into a secret bugging device. In a time where voice-activated digital assistants… Read more »

Share

US healthcare giant suffers another data breach

      Comments Off on US healthcare giant suffers another data breach

Hot on the heels of one of the largest pay-outs in data breach history (a cool $115m to cover the credit monitoring of some 79 million individuals), Anthem Inc – the number one provider of health insurance in America – has admitted to another haemorrhage of sensitive information on over… Read more »

Share

Ransomware made easy

      Comments Off on Ransomware made easy

To coincide with Def Con and Black Hat, cybersecurity’s two biggest events, the BBC has been scrutinising the world of internet crime – in particular how easy it is to become a cyber criminal. The dramatic growth in ransomware is attributed to the ready availability, from a run-of-the-mill search engine,… Read more »

Share

The definitive guide to password etiquette?

      Comments Off on The definitive guide to password etiquette?

Troy Hunt is an Australian web security expert and creator of the ‘Have I Been Pwned?’ website that allows internet users to check if their personal data has been breached. In his latest blog post he pulls together information from a number of sources to give a fascinating and very… Read more »

Share

How hackers can cache in

      Comments Off on How hackers can cache in

Information security specialist Omer Gil has come up with an ingenious method of conning a web server into exposing personal data through a caching attack. Any sites that use content delivery network (CDN) services are vulnerable to this new threat. Gil’s idea, showcased at Black Hat Conference, demonstrates how an… Read more »

Share

Google introduces new app vetting scheme

      Comments Off on Google introduces new app vetting scheme

In response to a number of recent phishing attacks, Google is beefing up its defences by unveiling a new ‘unverified app’ screen that instructs users and developers to tread carefully. This will replace the current ’error’ page that warns against opening dodgy apps and attachments. While users are still at… Read more »

Share

Ransomware becoming more targeted

      Comments Off on Ransomware becoming more targeted

Purveyors of ransomware have, until now, tended to adopt a shotgun approach; spraying malicious code across as wide a field (aka the Internet) as possible in the hope that some of it will hit a victim. It now appears that they have switched their weapon of choice to a sniper… Read more »

Share