Top IT Security Bloggers

  • Firefox kills the Battery Status ‘super cookie’

    Sophos - Naked Security
    What is the Battery Status API good for? Besides tracking you online that is.
  • Facebook halts plan to mine profiles for insurance quotes

    Sophos - Naked Security
    It's opt-in for now, but Admiral - one of the biggest car insurance companies in the UK - isn't ruling out expanding the program.
  • Don’t cyber-mess with Britain, warns UK Chancellor

    Sophos - Naked Security
    The UK will retaliate against cyber-attackers, Philip Hammond promises
  • New FCC ISP privacy rules create more questions than answers

    Sophos - Naked Security
    The FCC's new ISP privacy rules have opened wide the debate on when and what data gathered over the internet should be deemed sensitive.
  • Services slowly resume after malware strikes UK hospitals

    Graham Cluley
    Services at a number of UK hospitals are slowly beginning to resume after a computer virus infected the electronic systems of their managing health care trust.
    David Bisson reports.
  • Computer Virus Cripples UK Hospital System

    Krebs on Security
    Citing a computer virus outbreak, a hospital system in the United Kingdom has canceled all planned operations and diverted major trauma cases to neighboring facilities. The incident came as U.K. leaders detailed a national cyber security strategy that promises billions in cybersecurity spending, new special police units to pursue organized online gangs, and the possibility of retaliation for major attacks.
  • 86-year-old grandmother billed $5K, accused of pirating zombie game

    Sophos - Naked Security
    An Ontario octogenarian has been caught up in Canada's institution of new copyright infringement rules.
  • Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.
    And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.
    Which means that you will be able to benefit from a daily update of the following:

    Information Security Headlines: Top trending news stories.
    Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
    Top Hackers: Organizations and people recognized as hackers by Recorded Future.
    Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
    Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

    Infosec professionals agree that the Cyber Daily is an essential tool:
    "I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.
    So, what are you waiting for?
    Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • Microsoft says you'll have to wait another week for critical Windows zero-day patch

    Graham Cluley
    The Russian-linked Fancy Bear group (also known as Strontium, APT28, Sednit or Sofacy) have been linked to targeted attacks.
  • Flying Dragon Eye: Uyghur Themed Threat Activity

    Arbor Networks
    DOWNLOAD FULL REPORT HERE DOWNLOAD INDICATORS OF COMPROMISE (IOCs) HERE This paper documents attempted exploitation activity aimed at Uyghur interests outside of China. Exploitation is being attempted via the usual tactic of spear phishing containing malicious attachments to targets. The exploit code attached used for dropping the malware is older – CVE-2012-0158 – and from […]

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place