Read the original article: Naked Security Live – Ransomware: what to do? Here’s the latest Naked Security Live video – enjoy (and please share with your friends)! Become a supporter of IT Security News and help us remove the…
Category: Naked Security – Sophos
Adobe Flash – it’s the end of the end of the end of the road at last
Read the original article: Adobe Flash – it’s the end of the end of the end of the road at last The journey to the end of Flash. Are we there yet? Become a supporter of IT Security News…
S3 Ep4: Now THAT’S what I call a fire alarm! [Podcast]
Read the original article: S3 Ep4: Now THAT’S what I call a fire alarm! [Podcast] Listen to the Naked Security podcast! Become a supporter of IT Security News and help us remove the ads. Read the original article: S3…
FBI “ransomware warning” for healthcare is a warning for everyone!
Read the original article: FBI “ransomware warning” for healthcare is a warning for everyone! The US government has warned of a ransomware escalation against the healthcare sector. BUT THAT DOESN’T MEAN THE REST OF US CAN RELAX! Become a…
Buer Loader “malware-as-a-service” joins Emotet for ransomware delivery
Read the original article: Buer Loader “malware-as-a-service” joins Emotet for ransomware delivery A relative newcomer in the “malware-as-a-service” scene is starting to attract the big-money ransomware criminals. Become a supporter of IT Security News and help us remove the…
Facebook “copyright violation” tries to get past 2FA – don’t fall for it!
Read the original article: Facebook “copyright violation” tries to get past 2FA – don’t fall for it! Watch out for “Facebook copyright violation” emails – even if they link straight back to Facebook.com Become a supporter of IT Security…
Phone scamming – friends don’t let friends get vished!
Read the original article: Phone scamming – friends don’t let friends get vished! You probably back yourself not to be flattered or scared by a voice scammer – but what about vulnerable friends or relatives? Become a supporter of…
Naked Security Live – Who’s watching you? 5 mobile privacy tips
Read the original article: Naked Security Live – Who’s watching you? 5 mobile privacy tips Here’s the latest Naked Security Live video – enjoy (and please share with your friends)! Become a supporter of IT Security News and help…
S3 Ep3: Cryptography, hacking and pwning Chrome [Podcast]
Read the original article: S3 Ep3: Cryptography, hacking and pwning Chrome [Podcast] Listen to the latest Naked Security podcast! Become a supporter of IT Security News and help us remove the ads. Read the original article: S3 Ep3: Cryptography,…
Time for a mobile privacy reset?
Read the original article: Time for a mobile privacy reset? Can you remember which permissions you gave to what apps, and why? Nor can we… time for a reset! Become a supporter of IT Security News and help us…
Chrome zero-day in the wild – patch now!
Read the original article: Chrome zero-day in the wild – patch now! Exploitable bug in Chrome – patch now! Become a supporter of IT Security News and help us remove the ads. Read the original article: Chrome zero-day in…
Russian “government hackers” charged with cybercrimes by the US
Read the original article: Russian “government hackers” charged with cybercrimes by the US What can we learn from the US DOJ indictments against the “Sandworm Team”? Become a supporter of IT Security News and help us remove the ads.…
Naked Security Live – Ping of Death: are you at risk?
Read the original article: Naked Security Live – Ping of Death: are you at risk? Here’s the latest Naked Security Live video – enjoy (and please share with your friends)! Become a supporter of IT Security News and help…
S3 Ep2: Creepy smartwatches, botnets and Pings of Death – Podcast
Read the original article: S3 Ep2: Creepy smartwatches, botnets and Pings of Death – Podcast Listen to the latest episode of the Naked Security Podcast Become a supporter of IT Security News and help us remove the ads. Read…
US Department of Justice reignites the Battle to Break Encryption
Read the original article: US Department of Justice reignites the Battle to Break Encryption How strong is too strong? Become a supporter of IT Security News and help us remove the ads. Read the original article: US Department of…
Windows “Ping of Death” bug revealed – patch now!
Read the original article: Windows “Ping of Death” bug revealed – patch now! No one has figured out how to run code with this bug yet – but if they do, you can bet that someone will turn it into…
Windows “Ping of Death” bug revealed – patch now!
Read the original article: Windows “Ping of Death” bug revealed – patch now! No one has figured out how to run code with this bug yet – but if they do, you can bet that someone will turn it into…
Creepy covert camera “feature” found in popular smartwatch for kids
Read the original article: Creepy covert camera “feature” found in popular smartwatch for kids This popular smartwatch aimed at kids had a backdoor that received covert encrypted commands via SMS. Advertise on IT Security News. Read the original article:…
Microsoft on the counterattack! Trickbot malware network takes a hit
Read the original article: Microsoft on the counterattack! Trickbot malware network takes a hit The crooks haven’t yet been caught and arrested, but their malware distribution network has been hit hard. Advertise on IT Security News. Read the original…
Naked Security Live – Cybersecurity tips for your own network
Read the original article: Naked Security Live – Cybersecurity tips for your own network Here’s the latest Naked Security Live video – enjoy (and please share with your friends)! Advertise on IT Security News. Read the original article: Naked…
S3 Ep1: Ransomware – is it really OK to pay? – Naked Security Podcast
Read the original article: S3 Ep1: Ransomware – is it really OK to pay? – Naked Security Podcast Our podcast is back for Series 3 – here’s Episode 1! Advertise on IT Security News. Read the original article: S3…
8 tips to tighten up your work‑from‑home network
Read the original article: 8 tips to tighten up your work‑from‑home network You don’t have to be an IT guru to beef up your cybersecurity at home. Sometimes it’s enough to ask yourself, “Which bits can I turn off?” …
8 tips to tighten up your work-from-home network
Read the original article: 8 tips to tighten up your work-from-home network You don’t have to be an IT guru to beef up your cybersecurity at home. Sometimes it’s enough to ask yourself, “Which bits can I turn off?” …
Naked Security Podcast – we’re back for Series 3!
Read the original article: Naked Security Podcast – we’re back for Series 3! Join us weekly for the Naked Security Podcast – back for Series 3 and available wherever good podcasts are found! Advertise on IT Security News. Read…
Gone phishing: workplace email security in five steps
Read the original article: Gone phishing: workplace email security in five steps David Mitchell, Senior Director of Email Product Management at Sophos, shares his top tips to optimize workplace email security. Advertise on IT Security News. Read the original…
Naked Security Live – Stay on top of phishing scams
Read the original article: Naked Security Live – Stay on top of phishing scams Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked Security Live…
If you connect it, protect it
Read the original article: If you connect it, protect it Last week, we said that “Friends don’t let friends get scammed.” They don’t let themselves get scammed, either! Advertise on IT Security News. Read the original article: If you…
Naked Security Live – “SMS scams: keep yourself and your family safe!”
Read the original article: Naked Security Live – “SMS scams: keep yourself and your family safe!” Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked…
REvil ransomware crew dangles $1,000,000 cybercrime carrot
Read the original article: REvil ransomware crew dangles $1,000,000 cybercrime carrot When a company pays a multimillion dollar ransomware blackmail demand, where do you think the money goes? Advertise on IT Security News. Read the original article: REvil ransomware…
REvil ransomware crew dangles $1,000,000 cybercrime carrot
Read the original article: REvil ransomware crew dangles $1,000,000 cybercrime carrot When a company pays a multimillion dollar ransomware blackmail demand, where do you think the money goes? Advertise on IT Security News. Read the original article: REvil ransomware…
Naked Security Live – “SMS scams: keep yourself and your family safe!”
Read the original article: Naked Security Live – “SMS scams: keep yourself and your family safe!” Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked…
Blast from the past! Windows XP source code allegedly leaked online
Read the original article: Blast from the past! Windows XP source code allegedly leaked online Windows XP source code! Fair game to take a peek, or best to look away? Advertise on IT Security News. Read the original article:…
SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it!
Read the original article: SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it! If you got someone else’s “free offer” in what looked like a misdirected message, would you take a peek? Advertise on IT…
iPhone 12 scam pretends to be Apple “chatbot” – don’t fall for it!
Read the original article: iPhone 12 scam pretends to be Apple “chatbot” – don’t fall for it! If you got someone else’s “free offer” in what looked like a misdirected message, would you take a peek? Advertise on IT…
Naked Security Live – “The Zerologon hole: are you at risk?”
Read the original article: Naked Security Live – “The Zerologon hole: are you at risk?” Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked Security…
Naked Security Live – “The Zerologon hole: are you at risk?”
Read the original article: Naked Security Live – “The Zerologon hole: are you at risk?” Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked Security…
A real-life Maze ransomware attack – “If at first you don’t succeed…”
Read the original article: A real-life Maze ransomware attack – “If at first you don’t succeed…” The crooks wanted $15,000,000. They didn’t get it. Huzzah! Advertise on IT Security News. Read the original article: A real-life Maze ransomware attack…
Zerologon – hacking Windows servers with a bunch of zeros
Read the original article: Zerologon – hacking Windows servers with a bunch of zeros Cryptography is hard. And cryptographic blunders can be hard to spot. This one was there for years… Advertise on IT Security News. Read the original…
Naked Security Live – “Should you worry about your wallpaper?”
Read the original article: Naked Security Live – “Should you worry about your wallpaper?” Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked Security Live…
Naked Security Live – “Should you worry about your wallpaper?”
Read the original article: Naked Security Live – “Should you worry about your wallpaper?” Naked Security Live – here’s the recorded version of our latest video. Enjoy. Advertise on IT Security News. Read the original article: Naked Security Live…
Serious Security: Hacking Windows passwords via your wallpaper
Read the original article: Serious Security: Hacking Windows passwords via your wallpaper Themes and wallpapers – how dangerous can they really be? Advertise on IT Security News. Read the original article: Serious Security: Hacking Windows passwords via your wallpaper
Fake web alerts – how to spot and stop them
Read the original article: Fake web alerts – how to spot and stop them How do you spot and deal with fake system alerts on both computers and mobile devices? Advertise on IT Security News. Read the original article:…
Monday review – catch up on our latest articles and videos
Read the original article: Monday review – catch up on our latest articles and videos Our recent articles and videos, all in one place. Advertise on IT Security News. Read the original article: Monday review – catch up on…
Phishing tricks – the Top Ten Treacheries of 2020
Read the original article: Phishing tricks – the Top Ten Treacheries of 2020 Here’s the Top Ten – or perhaps we mean The Worst Ten. How many would you fall for? Advertise on IT Security News. Read the original…
Vishing scams use Amazon and Prime as lures – don’t get caught!
Read the original article: Vishing scams use Amazon and Prime as lures – don’t get caught! How do you deal with scam calls on a phone number you keep for emergencies? Advertise on IT Security News. Read the original…
Phishing scam uses Sharepoint and One Note to go after passwords
Read the original article: Phishing scam uses Sharepoint and One Note to go after passwords Not all phishing links appear right in the email itself… Advertise on IT Security News. Read the original article: Phishing scam uses Sharepoint and…
Monday review – catch up on our latest articles and videos
Read the original article: Monday review – catch up on our latest articles and videos Our recent articles and videos, all in one place. Advertise on IT Security News. Read the original article: Monday review – catch up on…
Fake Android notifications – first Google, then Microsoft affected
Read the original article: Fake Android notifications – first Google, then Microsoft affected Were you woken up by a bogus Android notification from Google or Microsoft this week? Advertise on IT Security News. Read the original article: Fake Android…
Russian cybercrime suspect arrested in $1m ransomware conspiracy
Read the original article: Russian cybercrime suspect arrested in $1m ransomware conspiracy When ransomware hits, there are always 3 questions. How much? Did they pay? And the big one: How did the crooks get in? Advertise on IT Security…
“Chrome considered harmful” – the Law of Unintended Consequences
Read the original article: “Chrome considered harmful” – the Law of Unintended Consequences A well-written article on the APNIC blog has provoked a thoughtful response from the Chromium coders – and we can all learn from it! Advertise on…
Monday review – catch up on our latest articles and videos
Read the original article: Monday review – catch up on our latest articles and videos Our recent articles and videos, all in one place. Advertise on IT Security News. Read the original article: Monday review – catch up on…
Outlook “mail issues” phishing – don’t fall for this scam!
Read the original article: Outlook “mail issues” phishing – don’t fall for this scam! We deconstruct an email phishing scam in detail so you don’t have to! Advertise on IT Security News. Read the original article: Outlook “mail issues”…
Using AI to fight hand-crafted Business Email Compromise
Read the original article: Using AI to fight hand-crafted Business Email Compromise Using natural language models to identify Business Email Compromise (BEC) Advertise on IT Security News. Read the original article: Using AI to fight hand-crafted Business Email Compromise
US liquor giant hit by ransomware – what the rest of us can do to help
Read the original article: US liquor giant hit by ransomware – what the rest of us can do to help If blackmailers dump data stolen from a company that refused to pay – don’t even peek at the data, Reward…
Monday review – catch up on our latest articles and videos
Read the original article: Monday review – catch up on our latest articles and videos Our recent articles and videos, all in one place. Advertise on IT Security News. Read the original article: Monday review – catch up on…
Tor and anonymous browsing – just how safe is it?
Read the original article: Tor and anonymous browsing – just how safe is it? How to stay safe when you’re using Tor, even if the network is littered with rogues. Advertise on IT Security News. Read the original article:…
Facial recognition – another setback for law enforcement
Read the original article: Facial recognition – another setback for law enforcement “Something needs to be done,” said the court. Where do you stand? For or against, have your say in our comments. Advertise on IT Security News. Read…
Monday review – catch up with the latest articles
Read the original article: Monday review – catch up with the latest articles The latest articles and the latest Naked Security Live video – all in one place. Enjoy. Advertise on IT Security News. Read the original article: Monday…
Business Email Compromise – fighting back with machine learning
Read the original article: Business Email Compromise – fighting back with machine learning Machine learning models are immune to blandishments, threats, flattery and so – so why not set them against social engineers? Advertise on IT Security News. Read…
Porn blast disrupts bail hearing of alleged Twitter hacker
Read the original article: Porn blast disrupts bail hearing of alleged Twitter hacker An alleged hacker’s bail hearing held online via Zoom with screen sharing enabled… what could possibly go wrong? Advertise on IT Security News. Read the original…
GandCrab ransomware hacker arrested in Belarus
Read the original article: GandCrab ransomware hacker arrested in Belarus Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia. Advertise on IT Security News. Read the original…
GandCrab ransomware hacker arrested in Belgium
Read the original article: GandCrab ransomware hacker arrested in Belgium Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia. Advertise on IT Security News. Read the original…
GandCrab ransomware hacker arrested in Belarus
Read the original article: GandCrab ransomware hacker arrested in Belarus Suspect is alleged to have extorted more than 1000 people, mostly in India, US, Ukraine, UK, Germany, France, Italy and Russia. Advertise on IT Security News. Read the original…
Monday review – our recent stories revisited
Read the original article: Monday review – our recent stories revisited Get yourself up to date with everything we've written in the last seven days – it's weekly roundup time. Advertise on IT Security News. Read the original article:…
Twitter hack – three suspects charged in the US
Read the original article: Twitter hack – three suspects charged in the US Three people have been fingered for the recent Twitter hack in which 45 high-profle accounts were taken over. Advertise on IT Security News. Read the original…
Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand
Read the original article: Travel company CWT avoids ransomware derailment by paying $4.5m blackmail demand US travel company CWT has reportedly coughed up $4.5m to ransomware crooks who stole data and scrambled files. Advertise on IT Security News. Read…
Servers at risk from “BootHole” bug – what you need to know
Read the original article: Servers at risk from “BootHole” bug – what you need to know We explain the “BootHole” vulnerablity – as usual, in plain English and without hype. Find if you’re affected and what to do. Advertise…
US tax service says, “2FA is a must!”
Read the original article: US tax service says, “2FA is a must!” We know it’s an old drum, but we’re not tired of beating it yet: 2FA is your friend. Advertise on IT Security News. Read the original article:…
Firefox 79 is out – it’s a double-update month so patch now!
Read the original article: Firefox 79 is out – it’s a double-update month so patch now! It’s a Blue Moon month for Firefox – the second full update in July! Advertise on IT Security News. Read the original article:…
ProLock ransomware – new report reveals the evolution of a threat
Read the original article: ProLock ransomware – new report reveals the evolution of a threat Ransomware crooks keep adjusting their approach to make their demands more compelling, even against companies that say they’d never pay up. Advertise on IT…
ASUS routers could be reflashed with malware – patch now!
Read the original article: ASUS routers could be reflashed with malware – patch now! Responsible disclosure means the bugs are already fixed – but don’t forget to check that you applied the patch. Advertise on IT Security News. Read…
Sports team nearly paid a $1.25m transfer fee… to cybercrooks
Read the original article: Sports team nearly paid a $1.25m transfer fee… to cybercrooks If a crook is already inside your email, occasionally adding in believable emails of their own… how on earth do you spot the fake ones? …
Monday review – the hot stories of the week
Read the original article: Monday review – the hot stories of the week Catch up on the past week’s stories, and watch our latest Naked Security Live video. Advertise on IT Security News. Read the original article: Monday review…
7 VPNs that leaked their logs – the logs that “didn’t exist”
Read the original article: 7 VPNs that leaked their logs – the logs that “didn’t exist” Just how private is your Virtual Private Network? Advertise on IT Security News. Read the original article: 7 VPNs that leaked their logs…
7 VPNs that leaked their logs – the logs that “didn’t exist”
Read the original article: 7 VPNs that leaked their logs – the logs that “didn’t exist” Just how private is your Virtual Private Network? Advertise on IT Security News. Read the original article: 7 VPNs that leaked their logs…
Monday review – the hot stories of the week
Read the original article: Monday review – the hot stories of the week Catch up on the past week’s stories, and watch our latest Naked Security Live video. Advertise on IT Security News. Read the original article: Monday review…
Apple’s latest updates are out for iPhones and Macs – get them now!
Read the original article: Apple’s latest updates are out for iPhones and Macs – get them now! None of Apple’s bugs have nicknames like Microsoft’s recent “SIGRed” – but there are nevertheless kernel-level code holes to be patched… Advertise…
Twitter limits tweeting as prominent accounts spam out cryptocoin scams
Read the original article: Twitter limits tweeting as prominent accounts spam out cryptocoin scams Twitter is investigating a rash of fraudulent tweets from prominent accounts – don’t fall for these scams! Advertise on IT Security News. Read the original…
Patch now! SIGRED – the wormable hole in your Windows servers
Read the original article: Patch now! SIGRED – the wormable hole in your Windows servers The bug can definitely crash your Windows DNS servers, and it could end up being used for much worse than that. Please patch now! …
RATicate malware gang goes commercial
Read the original article: RATicate malware gang goes commercial O, what tangled code we weave, when first we practise to deceive! Advertise on IT Security News. Read the original article: RATicate malware gang goes commercial
Digicert revokes a raft of web security certificates
Read the original article: Digicert revokes a raft of web security certificates The good news is that this was a bureaucratic necessity rather than an actual cybersecurity attack. Advertise on IT Security News. Read the original article: Digicert revokes…
Monday review – the hot stories of the week
Read the original article: Monday review – the hot stories of the week Get yourself up to date with everything we've written in the last seven days – it's weekly roundup time. Advertise on IT Security News. Read the…
Kinda sorta weakened version of EARN IT Act creeps closer
Read the original article: Kinda sorta weakened version of EARN IT Act creeps closer Critics say the amended bill that’s headed for a full Senate hearing still threatens encryption, albeit less blatantly. Advertise on IT Security News. Read the…
Mozilla turns off “Firefox Send” following malware abuse reports
Read the original article: Mozilla turns off “Firefox Send” following malware abuse reports Sadly, the easier and safer you make your file sharing service, the more attractive it becomes to the crooks. Advertise on IT Security News. Read the…
Mozilla turns off “Firefox Send” following malware abuse reports
Read the original article: Mozilla turns off “Firefox Send” following malware abuse reports Sadly, the easier and safer you make your file sharing service, the more attractive it becomes to the crooks. Advertise on IT Security News. Read the…
Kinda sorta weakened version of EARN IT Act creeps closer
Read the original article: Kinda sorta weakened version of EARN IT Act creeps closer Critics say the amended bill that’s headed for a full Senate hearing still threatens encryption, albeit less blatantly. Advertise on IT Security News. Read the…
Company web names hijacked via outdated cloud DNS records
Read the original article: Company web names hijacked via outdated cloud DNS records Why hack into a server when you can just send vistors to a fake alternative instead? Advertise on IT Security News. Read the original article: Company…
Flashy Nigerian Instagram star extradited to US to face BEC charges
Read the original article: Flashy Nigerian Instagram star extradited to US to face BEC charges It’s a short jump from a Rolls Royce ride to extradition from the UAE. Goodbye, Dubai, goodbye, Palazzo Versace, hello, Chicago jail cell. Advertise…
Boston bans government use of facial recognition
Read the original article: Boston bans government use of facial recognition To help end systemic racism, we’ll stay away from an error-prone technology that’s been shown to have racial bias, the city council said. Advertise on IT Security News.…
Monday review – the hot 11 stories of the week
Read the original article: Monday review – the hot 11 stories of the week Get yourself up to date with everything we've written in the last seven days – it's weekly roundup time. Advertise on IT Security News. Read…
Facebook hoaxes back in the spotlight – what to tell your friends
Read the original article: Facebook hoaxes back in the spotlight – what to tell your friends At the risk of giving you a feeling of déjà vu all over again, it’s time to talk about Facebook hoaxes once more. …
Google buys AR smart-glasses company North
Read the original article: Google buys AR smart-glasses company North They’re not surveillance spectacles, says Google, just a piece in the jigsaw of “ambient computing”, where helpfulness is all around you. Advertise on IT Security News. Read the original…
MongoDB ransom threats step up from blackmail to full-on wiping
Read the original article: MongoDB ransom threats step up from blackmail to full-on wiping Still thinking “the crooks probably won’t find me if I make a security blunder”? Advertise on IT Security News. Read the original article: MongoDB ransom…
133m records for sale as fruits of data breach spree keep raining down
Read the original article: 133m records for sale as fruits of data breach spree keep raining down Databases can be had for as little as $100, on up to $1,100. Most, if not all, are being sold by the hacking…
Microsoft issues critical fixes for booby-trapped images – update now!
Read the original article: Microsoft issues critical fixes for booby-trapped images – update now! Booby-trapped images could be used to attack Windows 10 and Windows Server 2019 – update now! Advertise on IT Security News. Read the original article:…
Google stops pushing scam ads on Americans searching for how to vote
Read the original article: Google stops pushing scam ads on Americans searching for how to vote No US entity charges citizens for registering to vote, but plenty of Google ads were happy to do so – and to grab your…
Firefox 78 is out – with a mysteriously empty list of security fixes
Read the original article: Firefox 78 is out – with a mysteriously empty list of security fixes TLS 1.0 and TLS 1.1 are now considered security risks and blocked by default. Advertise on IT Security News. Read the original…
Google joins Apple in limiting web certificates to one year
Read the original article: Google joins Apple in limiting web certificates to one year Is it fair to expect everyone to renew all their web certificates every year? Apple says yes, and now Google does too. Advertise on IT…
iOS 14 flags TikTok, 53 other apps spying on iPhone clipboards
Read the original article: iOS 14 flags TikTok, 53 other apps spying on iPhone clipboards TikTok, for one, promised to knock this off months ago but was caught red-handed, still at it, by the new clipboard notification in iOS 14.…
Beware “secure DNS” scam targeting website owners and bloggers
Read the original article: Beware “secure DNS” scam targeting website owners and bloggers If you run a website or a blog, watch out for emails promising “DNSSEC upgrades” – these scammers are after your whole site. Advertise on IT…