Top IT Security Bloggers

Graham Cluley
  • Dixons Carphone admits hack far bigger than originally thought

    Graham Cluley
    Company now says approximately 10 million personal records could have been accessed in security breach.
  • New York Times profiles one of its own security experts

    Graham Cluley
    Last week, the New York Times published a brief profile of privacy and security researcher Runa Sandvik.
    Well known in the security community, Sandvik has been working at the New York Times since March 2016, boosting the security and privacy of journalists, anonymous sources, and indeed subscribers.
  • Prison inmates hacked tablets to earn $225,000 in credits

    Graham Cluley
    364 inmates in five of Idaho’s state prisons have exploited vulnerabilities in the JPay tablets they use to read email and access video games in order to boost their credit balances.
    Read more in my article on the Hot for Security blog.
  • 1.4 million online fashion shoppers exposed after data breach at UK ecommerce provider

    Graham Cluley
    Up to 1.4 million customers of a number of UK clothing and accessories websites have had their personal information exposed following a security breach at an IT services provider that they were sharing.
  • Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily

    Graham Cluley
    Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!
    Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.
    And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.
    Which means that you will be able to benefit from a daily update of the following:

    Information Security Headlines: Top trending news stories.
    Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.
    Top Hackers: Organizations and people recognized as hackers by Recorded Future.
    Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research (“reverse engineering,” “proof of concept”) to malicious exploitation (“exploited in the wild,” “weaponized”).
    Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.

    Infosec professionals agree that the Cyber Daily is an essential tool:
    “I look forward to the Cyber Daily update email every morning to start my day. It’s timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future’s Cyber Daily is the perfect first step that helps to prioritize security actions.” - Tom Doyle, CIO at EBI Consulting.
    So, what are you waiting for?
    Sign up for the Cyber Daily today, and starting tomorrow you’ll receive the top trending threat indicators.

    If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
  • Senator calls on US Government to start killing Flash now

    Graham Cluley
    For some companies eradicating Adobe Flash Player is going to be a significant job. And it may be an even bigger challenge for very large organisations, such as the US Government.
    Read more in my article on the Tripwire State of Security blog.
  • Smashing Security #088: PayPal’s Venmo app even makes your drug purchases public

    Graham Cluley
    Websites still using HTTP are marked as “not secure” by Chrome, 85,000 Google employees haven’t been phished for a year, and if you’re buying drugs via PayPal’s Venom app you should say goodbye to privacy.
    All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Scott Helme.
  • Mind your company’s old Twitter accounts, rather than allowing them to be hijacked by hackers

    Graham Cluley
    There were only 13 episodes of the science fiction TV show “Almost Human” aired before it was pulled from the schedules in 2014.
    But its Twitter account lives on, under the control of cryptocurrency giveaway scammers.
  • Here’s why Twitter will lock your account if you change your display name to Elon Musk

    Graham Cluley
    There’s bad news if your name really is “Elon Musk”.
    You’re going to have to jump over some additional hurdles to convince Twitter that you should be allowed to change your display name to the one you share with the boss of Tesla and SpaceX.
    Read more in my article on the Hot for Security blog.
  • UK university domains spoofed in massive fraud campaign targeting suppliers

    Graham Cluley
    Be on your guard if your company has received an order which appears to come from a UK university email address.
    That’s the advice of Action Fraud, the UK’s national reporting service for fraud and financially-motivated cybercrime, after it saw a marked rise in the number of domains being registered that look very similar to genuine universities.
    Read more in my article on the Hot for Security blog.

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release