- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Malware still running rings around security tools, eThreatz testing finds
- 2 million stolen login credentials discovered for Facebook, Google, LinkedIn, Twitter, other sites
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
A decade of data breaches has left barely one in ten UK consumers with faith in the ability of large organisations to safeguard their personal data, a survey for Fujitsu has revealed.
The magic circle of USB wizards has finally decided to wave their wands at one of the interface's most baffling annoyances - which way round should the cable connector be when plugging it in?
Getting infected USB sticks inside large firms and government organisations would be child's play for determined cybercriminals, Kaspersky Lab has found after one of its researchers successfully persuaded staff at several to open a PDF file during a staged visit.
The booming Bitcoin price is driving rogue software firms to embed mining functions inside apparently innocent tools that come with End User Licence Agreements (EULAs) legitimising the behaviour, security firm Malwarebytes has warned.
First came the closure of criminal underground Silk Road, now an apparently vast theft of Bitcoins from one of the sites that replaced it, Sheep Marketplace. Are the users of darkweb markets now being targeted by criminals?
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.