Posted by David Harley on June 12, 2017
Heimdal Security asked 20 experts (plus me) to name their favourite security books.
Posted by David Harley on May 17, 2017
…Not that we’re exactly in the post-WannaCryptor era yet. But forgive me if you’ve heard enough of the saga of the ransomware ESET calls Win32/Filecoder.WannaCryptor.D (after just a few days, I certainly have). Craig Williams, of the company Gigabyte IT Solutions on St. Helena, mailed me wondering about my take on the issue.* Here are a […]
Posted by David Harley on May 13, 2017
Even XP, Windows 8, and Windows Server 2003 systems can now be patched against the vulnerability exploited by WannaCrypt. Patching is highly recommended!
Posted by David Harley on April 25, 2017
Pump and Dump spam campaign still piling on the improbabilities.
Posted by David Harley on April 19, 2017
A few years ago, even before I started working directly with vendors in the security industry, ‘Pump and Dump’ scams were a major nuisance. Here’s a description from a paper Andrew Lee and I wrote after I started working with ESET. Pump and Dump (or Hype and Dump) mails are designed to inflate the value […]
Posted by David Harley on February 20, 2017
VBS/Loveletter demonstrated that sometimes the quality of malcode doesn’t matter if the social engineering hits the spot.
Posted by David Harley on January 30, 2017
On the 28th January 2017, a news site reported that Hotel ransomed by hackers as guests locked out of rooms. The story initially claimed that a ransomware gang had been able to compromise systems in the Romantik Seehotel Jägerwirt in Austria including the key card registry system, even managing to lock guests into their rooms. The […]
Posted by David Harley on November 24, 2016
Sometimes the borderline between out-and-out support scams and sub-optimal diagnostic services is too blurry for comfort.
Posted by David Harley on November 12, 2016
Why make judgements based on memetic misinformation when there’s plenty of live footage to work from?
Posted by David Harley on November 7, 2016
West African cybercrime nowadays has moved on from unsophisticated 419s to technically-based, effective Wire-Wire attacks on businesses.
Page 1 of 10:12345...10Next »