Dec 17 | A truly awful security vulnerability | NSO considers its options | Safety in the metaverse | Getting lazy at home | Apple bows to privacy pressure....for the moment |
Dec 10 | A spyware case study | Router vulnerabilities | Changes to Cyber Essentials | The risks in web browsers | Multiple MacBook problems emerge...as Apple plans new models |
Dec 3 | Cracking down on cybercrime, except in Russia | China and COVID-19 disinformation | Abusing Rich Text Format files | The need to protect cloud resources | What encrypted messaging services will tell the FBI |
Nov 26 | Pegasus has its wings clipped | GoDaddy breached | Cuts in ransomware insurance cover | Cloning fingerprints for $5 | Facebook and foreign language moderation |
Nov 19 | Cyber manoeuvres | More on the scale of organised | crimeRansomware developments | Man in the middle attacks |Apple's patchy security updates |
Nov 12 | The extraordinary scale of the spyware industry | Phishing stats | Hackers for hire | A persuasive hybrid scam | Crime figures up, prosecutions down, as scumbags pivot from the US to Europe |
Nov 6 | Ransomware; damage, evolution and a victory for law enforcement | Spyware sanctions | Facebook and facial recognition | Fears about AI and quantum computing |
Oct 29 | Facebook's (Meta's) next big challenge | A New York Times journalist hacked, repeatedly | WiFi risks | The ransomware business model evolves again | How Internet Service Providers make money from people's browsing |
Oct 22 | Does it matter what Facebook calls itself? | Deep fake voices | US TV stations crippled | Restricting spyware exports from the US | A ransomware warning and advice |
Oct 15 | An international summit agrees to fight ransomware, but China and Russia weren't invited | The fake news mastermind who helped elect Trump | How to defeat multi-factor authentication | Android snooping | Google's new security initiative |
Oct 8 | What to do about a problem like Facebook | The US seeks partners to combat cybercrime | More light shone on China's cyber capabilities | Dubai's ruler plays dirty with Pegasus | The risk from insiders (especially disgruntled ones) | Windows 11 launches to a mixed reception |
Oct 1 | Facebook hauled over the coals | Ransomware's impact on healthcare | A global view of offensive cyber capabilities | Authorised fraud | Amazon's less than amazing 'robot' |
Sep 24 | A horribly bad week for Facebook | More warnings about ransomware | French government ministers hacked with Pegasus | A warning for Huawei and Xiaomi phone owners | Police sting the Italian Mafia |
Sep 17 | Security vulnerabilities and surveillance | Unpalatable truths about Facebook | Ransomware and what to do about it | Abolishing passwords | Protecting yourself against software you didn't even know you were using |
Sep 10 | Germany revealed as Pegasus customer | Protonmail hands over activist details | Unpicking coverage of WhatsApp's end-to-end encryption | How nation states target people they don't like | Apple tries to reverse out of cul-de-sac |
Sep 3 | Cautionary tales about digital identity | Denial of service; threats and protections | Credential theft | T-Mobile and a 21-year old hacker | Multi-factor good, single-factor really bad! |
Aug 27 | Pegasus flies through Apple's defences | Facebook's radical approach to transparency | UK plays Pandora with data protection | Data harvesting | Bumble bungles location protection |
Aug 20 | Tech and the Taliban | Website dangers | Passwords; employees understand the risks...and ignore them | FBI warns about insider spies | Ransomware; so easy anyone can have a go |
Aug 13 | Apple explains its initiative to combat child sexual abuse | China spies on Israel, blames Iran | A spectacular hack in Belarus | Exploiting the pandemic | Watching us while we work...at home |
Aug 6 | Pegasus - official confirmation and new competitors | Apple's plans to scan your iPhone | Ransomware update | The risk of public networks | What images reveal about us | Ransomware scumbags seeks to recruit insiders |
Jul 30 | Cyber warfare and a shooting war | What Iran has been up to | Surveillance and journalists | The Virtual Private Network that wasn't as private as it should have been | The insider threat |
Jul 23 | Pegasus; what's new? | China trades hacking accusations with the US and its allies | How safe is Telegram? | Social media and misinformation | When your location isn't as anonymous as it's supposed to be |
Jul 16 | Ransomware group goes dark | Iranian hackers | Another Israeli spyware company emerges | Should you have to prove who you are to use social media | Facebook creeps |
Jul 9 | Ransomware goes large | Framing your opponent | Browse with care | Weird WiFi names are more of a problem than first thought | Revealing the link between spyware and real-world violence |
Jul 2 | 700 million LinkedIn profiles published...but don't call it a data breach | How thousands of storage devices were wiped remotely | Lack of awareness | This week's spy news | The researchers who believe social media could end humanity |
Jun 25 | More on ransomware, including scary figures on the number of businesses that close following an attack | The risks of cloud storage | Data privacy; what data privacy | Securing remote workers | Surveillance advertising |
Jun 18 | The unstoppable rise of ransomware | Dumping passwords | Apple's recipe for email privacy | Big changes for Big Tech | Camera vulnerabilities |
Jun 11 | Apple - big news and small print | Stolen passwords and old accounts | A spectacular success for law enforcement | A web failure and a silver lining |
Jun 4 | What to do about ransomware | Nuclear flashers...and protecting sensitive data | The future of connectivity | WhatsApp caves in
|
May 28 | Cyber-espionage and the risks of doing nothing | Fines pick up pace as the GDPR turns three | Mass surveillance is OK if you protect what you gather | The insider risk, this time at the FBI | Facebook tries to seize the regulatory initiative
|
May 21 | The extraordinary profitability of ransomware | The dark patterns that persuade us | Apple chucks macOS under the iOS bus | Evidence planted on Indian activists | The awe-inspiring scale of digital crime
|
May 14 | Ransomware gets real | The human element behind 85% of breaches | Germany takes on WhatsApp, as users get ultimatum | Broken WiFi | Chinese disinformation
|
May 7 | Big tech, big battles | Bellingcat strikes again | Passwords, bloody passwords | Surveillance by TV | Router risks
|
Apr 30 | Apple; privacy and accusations | 48 ways to combat ransomware | Spyware. Russian tactics | The risks of QR codes
|
Apr 23 | Apple news, including the unintended release of plans to revamp the MacBook range | The extraordinary tale of North Korea's digital army | Facebook mistakenly reveals its PR strategy to deal with data breaches | How the UK hopes to secure internet-connected devices | EU proposals to regulate AI
|
Apr 16 | Breach. What breach? | Apple's 'butter knife' security | Russia sanctioned for cyber attacks | Farewell cookies, hello FLoC | Biometric security
|
Apr 9 | Breaches galore | Cyber war...and deep fakes | Hacking humans | Assassins for hire
|
Apr 2 | Ubiquiti's hapless breach response | The sophistication of North Korean hackers | The mirage of opting out of data analytics | Getting real about vaccine passports | Cybersecurity lessons from the pandemic
|
Mar 26 | Social media's dilemmas | Why China's spooked by Teslas | The dirty truth about Sky Bet | Safe browsing | How not to chase debts
|
Mar 19 | Sabre-rattling | Cyber crime hits record highs | The illusion of online privacy | Intercepting text messages for $16 | Moms breaking bad
|
Mar 12 | Exchange calamity | Proving who you are online | More criminals taken down | Russia hacks itself | Nonfungible tokens
|
Mar 5 | Assuming the worst...and Zero Trust | Blaming the intern | Conflicted security beliefs | Going passwordless (and a forthright Swedish ad campaign
|
Feb 26 | Defining 'cyberwarfare' | Amazon security concerns. Facebook, Australia and the chicken game | The power of open source intelligence | Mixing work and personal | Why you're feeling worn out by video calls
|
Feb 19 | Cybercrime; the $1 trillion business | Snooping emails | Facebook skates on thin ice | Chrome beats out macOS | SolarWinds and wilful ignorance |
Feb 12 | Poisoned water, poor security and what not to do | Privacy | The sorry state of bug bounties | MacBook battery replacements
|
Feb 5 | Playing with fire...and ignoring the heat | Home printing rules | Attacking charity | Oversharing on social media...and on camera
|
Jan 29 | Social media bans and a lone protester in New York state | The pessimism of InfoSec leaders | Journalist safety | Data protection fines on the up | Amazon and its 'dark patterns' | The mind-boggling scale of data breaches |
Jan 22 | Unpicking the aftermath of the Capitol Hill rampage | Cloud security | Privacy is us, says WhatsApp, as tens of millions sign up for alternatives | Dark Web marketplace takedown | Mesh WiFi | Warnings about male chastity cage fulfilled |
Jan 15 | Disinformation and disorder | SolarWinds fallout | WhatsApp's new no-choice privacy policy | Media companies targeted | Ghislaine Maxwell, her phone and the police | Updates for leading web browsers |
Jan 1 | Data transfers and the reality of "taking back control" | Tools to ease the life of Microsoft admins | 21 cyber criminals feel the long arm of the law | The latest threats; anyone for a cheap puppy? |