Top IT Security Bloggers

Graham Cluley
  • 12 Common Threat Intelligence Use Cases

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.
    Are you using threat intelligence to its full potential?
    The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner "Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.
    You will learn how to:

    Identify 12 common threat intelligence use cases.
    Align these use cases to your specific requirements.
    Implement strategies for getting value from threat intelligence.
    Evaluate vendors based on your business needs.

    Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • How a Bitcoin phishing gang made $50 million with the help of Google AdWords

    Graham Cluley
    A cybercrime gang based in Ukraine is estimated to have made as much as $50 million after tricking Bitcoin investors into handing over the login credentials for their online wallets.
    Read more in my article on the Tripwire State of Security blog.
  • Smashing Security #065: Cryptominomania, Poppy, and your Amazon Alexa

    Graham Cluley
    Cryptomining goes nuclear, YouTube for Kids gets scary, and TV ads have been given the green light to mess with your Amazon Alexa.
    All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Maria Varmazis.
  • Patch now! Microsoft fixes over 50 serious security flaws

    Graham Cluley
    This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft.
    Read more in my article on the We Live Security blog.
  • Salon website gives you a choice: turn off your ad blocker or let us mine cryptocurrencies

    Graham Cluley
    If you don't want to disable your ad blocker, maybe you'll feel comfortable letting run code from Coinhive which will gobble up your computer's resources to mine some Monero cryptocurrency.
  • Google is bringing AMP to email

    Graham Cluley
    We need to keep an eye on this. Making email "richer" in terms of features has always brought new security challenges.
  • UK Government announces tool to detect and block extremist videos

    Graham Cluley
    A UK company has received £600,000 of taxpayer's money to develop detection software, trained with thousands of hours worth of video content posted by Islamic State.
  • Uh-oh. How just inserting a USB drive can pwn a Linux box

    Graham Cluley
    Give a USB drive a volume name like this, hand it to a friend who runs KDE Plasma on their Linux box, and they won't be your friend much longer.
    Read more in my article on the Hot for Security blog.
  • All HTTP websites to soon be marked as 'not secure' by Google Chrome

    Graham Cluley
    If you're still running a website that is using insecure HTTP then it's time to wake up and drink the coffee.
    Because unless you take action soon, you're going to find many of your visitors are going to distrust your website.
    Read more in my article on the We Live Security blog.
  • Government websites hijacked by cryptomining plugin

    Graham Cluley
    More than 4000 websites, including many belonging to governments around the world, were hijacked this weekend by hackers who managed to plant code designed to exploit the computer power of visiting PCs and mine for cryptocurrency.

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release