Top IT Security Bloggers

Graham Cluley
  • The Pirate Bay website quietly runs a cryptocurrency miner on visitors' PCs, gobbling up CPU cycles

    Graham Cluley
    The Pirate Bay surprised many of its users when it quietly added a JavaScript-based cryptocurrency miner to its website.
    David Bisson reports.
  • CCleaner, distributed by anti-virus firm Avast, contained malicious backdoor

    Graham Cluley
    Trusted by millions, distributed by an anti-virus company, CCleaner compromised the security of users with a malicious backdoor.
  • Equifax confirms up to 400,000 UK consumers at risk after data breach

    Graham Cluley
    Credit reporting agency Equifax has revealed more details of just how many people are affected in the UK, as consumers are warned of the risk of phishing attacks.
    Read more in my article on the We Live Security blog.
  • Guess what happened after VEVO told its hackers to 'f**k off'...

    Graham Cluley
    A hacking gang posted 3.12 terabytes of VEVO's internal files online, after it discovered the company was being reckless with its security.
    David Bisson reports.
  • Poisoned plugin allowed hackers to post spammy content on up to 200,000 WordPress websites

    Graham Cluley
    As many as 200,000 websites may have been running a WordPress plugin that allowed third parties to publish any content they wished on victims’ sites via a backdoor. Watch out for supply chain attacks that could impact your website...
    Read more in my article on the Tripwire State of Security blog.
  • Firm offers up to $1 million for Tor zero-day exploits - but who will they sell them to?

    Graham Cluley
    A company is offering up to one million dollars in bounties for anyone who finds and reports exploitable zero-day flaws in the Tor Browser.
    David Bisson reports.
  • Smashing Security podcast #042: Equifax, BlueBorne, and the iPhone X

    Graham Cluley
    Equifax's shambolic response to its huge data breach, a scary-sounding Bluetooth exploit, and Apple's iPhone X comes with Face ID.
    All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Javvad Malik.
  • BlueBorne threatens almost every connected device with Bluetooth-based attacks

    Graham Cluley
    Researchers have discovered a new attack vector they've named "BlueBorne" that enables bad actors to compromise nearly every connected device via Bluetooth.
    David Bisson reports.
  • Microsoft strangles critical vulnerabilities, including in-the-wild zero-day flaw. Patch now!

    Graham Cluley
    Microsoft has once again released a batch of essential security updates for users of its software. What are you waiting for?
    Read more in my article on the Hot for Security blog.
  • Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.
    And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.
    Which means that you will be able to benefit from a daily update of the following:

    Information Security Headlines: Top trending news stories.
    Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
    Top Hackers: Organizations and people recognized as hackers by Recorded Future.
    Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").
    Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

    Infosec professionals agree that the Cyber Daily is an essential tool:
    "I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.
    So, what are you waiting for?
    Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place