Dec 16 | Greece bans commercial spyware...for private individuals | The indiscriminate exploitation of social media to attack targets | Musk uses Twitter to launch a manhunt | What happens when your iPhone is stolen | One ruse to make sure you get the presents you want
|
Dec 9 | Warnings of a winter of cyber attacks against Ukraine | Human rights organisations breached | ChatGPT and cybersecurity (and some alarming opinions on the human race) | An about turn on those San Francisco police robots |
Dec 2 | Password manager problems | Russia seeks ways to break into Signal | Musk advances on Apple and just as quickly retreats | San Francisco police get the nod to deploy their robots |
Nov 25 | Twitter's moderation morass | Security issues at Mastodon | Another Twitter alternative | A major victory for law enforcement | The most popular password is...yup, you guessed | The plan to allow San Francisco police to use robots that are authorised to kill |
Nov 18 | Twitter's security risks - and a warning for whistleblowers | UAE accused of long-term meddling in US affairs | Privacy concerns over event apps | Tuvalu's plan to create a digital copy of its history and culture |
Nov 11 | Elon's house of chaos | Password abuse | EU parliament calls for spyware moratorium | The threat from nation states. No-leak headphones |
Nov 4 | Elon's verification problem | Cybersecurity challenges and what to do about them | What we can learn from Liz Truss | Geolocation tricks | How to earn $2 million a year from LinkedIn |
Oct 28 | Lessons from the bitter experiences of others | Don't be fooled by an apparent fall in ransomware attacks | Good and bad news on passwords | LinkedIn tries to get its house in order | Uganda outlaws sharing information about anyone without their permission |
Oct 21 | Framing journalists | Why bother with deepfakes when phishing is so effective | Younger workers and their cavalier attitude to security | Mandatory apps for visitors to the World Cup in Qatar
|
Oct 14 | Spyware; the "existential crisis" for journalism | A phishing kit available to anyone with an email address | Killing off passwords | An incredible online scam finally hooks a victim
|
Oct 7 | Surveillance in Mexico, China and the EU | Protecting against ransomware | More use of Microsoft Teams creates more challenges for admins | The Tory conference, Jacob Rees-Mogg and an adult dating site
|
Sep 30 | Some takeaways from the latest high-profile breaches | Regulate disinformation like guns, bombs and nukes | Letting down spies | The "shameware" being used by churches in the US.
|
Sep 23 | Lesson's from incidents at Uber and LastPass | VMware summarises the key threats to consider | A record number of phishing attempts | Identifying deepfake audio | Moving from online crime to violent assault in real life |
Sep 16 | An airing for more of Twitter's dirty laundry | Iran's latest phishing technique | The threat from a technologically dominant China | Apple's latest updates | The prisoner serving time for cybercrime who carried on scamming from his cell |
Sep 9 | Apple's latest iPhone update and its ambitions in space | Iran denies attacking Albania | The scale of the market in stolen personal information | The TikTok data breach that wasn't what it seemed |
Sep 2 | Greece wriggles on the spyware hook | €8 million to compromise iPhones and Androids | Getting tough with location brokers | Poking some well deserved fun at LinkedIn |
Aug 26 | Twitter whistle blown | Hard times for the maker of Pegasus spyware | Google bans father over photo of his naked toddler | The insecure media sector | The US start-up that's making people sound 'whiter' |
Aug 19 | Supply chain risks made real | The highlights of the annual Vegas hacking conferences | 14 EU countries among Pegasus customers | A(nother) vital update from Apple | The Janet Jackson song that can freeze old hard drives!
|
Aug 12 | Important lessons from high-profile incidents | Up to 20 years in jail for the Twitter spy | WhatsApp's new group features | The stalker headed to prison for stalking his ex-girlfriend with an AirTag
|
Aug 5 | Practical measures to combat ransomware | Spyware in Greece | Bypassing MFA | Some very persuasive scams | What's the life expectancy of your gadget?
|
Jul 29 | What to do about a problem like spyware | A withering report on the quality of cybersecurity training. Combatting the trolls | Turning the tables on a sextortionist | The fragile internet | The secure messaging app that turned out to be anything but
|
Jul 22 | Surveillance via spyware and data brokers | Russia's latest cyber tactics in Ukraine | Hacking our search habits | The GPS tracker that could be used to shut down a vehicle remotely | Important Apple updates
|
Jul 15 | Why and how nation states target journalists | A conviction in "one of the most brazen and damaging acts of espionage in American history.” | Defeating multi-factor authentication | Apple's rotten app store
|
Jul 8 | The latest on Ukraine | Stalking with AirTags | The Chinese threat | iPhone security measures | How conspiracy theories spread
|
Jul 1 | The privacy implications of overturning Roe vs Wade | Gartner highlights the supply chain in its cybersecurity predictions | The ransomware business evolves
|
Jun 24 | The dystopian state of surveillance | The UK's data protection pipe dream | Spyware maker fails to reassure European lawmakers | Market forces push down the prices of stolen and forged data
|
Jun 17 | Why web browsers make lousy password managers | Russia warns the West about cyber attacks | One email account; 69,000 people's healthcare data breached | Ring's audio functionality
|
Jun 10 | The latest news from Apple, some of it really rather important | The unintended side effects of sanctions | Ransomware tactics | Voice recognition pros and cons | The artificial intelligence startup that was less intelligent and more artificial than advertised
|
Jun 3 | The power of publicity and the travails of a spyware maker | Ukraine's resourcefulness | China's Pacific strategy | Unearthing images. | A dangerous vulnerability in Microsoft Office
|
May 27 | The latest cybersecurity trends | The Ukraine conflict continues to provoke cyber attacks | Russia accused of leaking pro-Brexit emails | The obstacles to controlling the global spyware industry | The risks of internet-connected sex toys
|
May 20 | The multi-faceted information war in Ukraine - and elsewhere | Why iPhones' Find My feature is a potential threat | The extraordinary scale of commercial data tracking | Some details to persuade us that updates really matter
|
May 13 | Western allies call out Russia | Cybercrime is a $6 trillion global business | Surveillance in the US | A free tool to check your email security | Driverless cars as surveillance cameras
|
May 6 | Russia's real cyber aims in Ukraine | The Pegasus approach to undermining your critics | World Password Day; just use a password manager | The Chinese drone swarm that can track a human through a forest
|
Apr 29 | Twitter; what Elon wants | Russia's cyber preparations for invading Ukraine | North Korea hacks hacks | Criminals with nation-state powers | Apple's DIY repair kits that cost almost as much as a professional
|
Apr 22 | Pegasus lands in Downing Street | Critical infrastructure warning | 'Zero-days' double in number | Organisations ill-prepared for cyber attacks | An inventor, AI and the imaginary friend that tried to kill him
|
Apr 15 | Digital tactics in a brutal war | Spyware targets the European Union | Cyber takedown | When a muted mic isn't | IATA's Travel Pass
|
Apr 8 | Differing views on the use of cyber weapons in the invasion of Ukraine | Resisting curious voicemails | How to become a cyber criminal for $700 | Another case of Pegasus being used against journalists
|
Apr 1 | Generational upheaval vs cybersecurity failings | More details on what disabled thousands of satellite terminals in Europe | The threat from fake profiles - and phishy job listings | The Lapsus$ gang and their sneaky tactics | Google's controversial changes to Workspace
|
Mar 25 | Sage security advice from the White House | A sneaky attack via Chrome | Killing passwords | Some of the world's biggest companies, attacked by a teenager
|
Mar 18 | Deep fakes and Russian capabilities | Chinese spies and counterclaims | Router risks | Exploiting smartphones
|
Mar 11 | The horror in Ukraine. Remote working worries | Stalkerware | Identifying every human's face with the help of 100 billion photos | China accuses
|
Mar 4 | Ukraine; the impact of social media memes | Messaging apps | The ransomware biter bitten | The risks from lousy password
|
Feb 25 | The horror in Ukraine. Remote working worries | Stalkerware | Identifying every human's face with the help of 100 billion photos | China accuses
|
Feb 18 | The vulnerability crisis | Transcription scare | Unpicking an attack on the ICRC | Facial recognition (again) | Surveillance in the US
|
Feb 11 | The benefits of multi-factor authentication - and how to defeat it | Remote working risks | Ransomware gangs get professional | Age verification in the UK | News Corp's 2-year exposure
|
Feb 4 | Unpicking the spyware industry | Phishing lures that work. | The scale of the threat from China | Making the most of Microsoft 365 | Giving WiFi motion sensors
|
Jan 28 | How attackers have exploited the pandemic | Human Rights Watch hit by spyware | The new Cyber Essentials is launched | Booby-trapped websites | Spying on WhatsApp
|
Jan 21 | Spyware agogo| Cyber attacks in Ukraine | Relax! That Olympic app is fine, China says | Arresting developments | 2G risks
|
Jan 14 | Critical infrastructure under threat | A messaging shakeup | Pegasus in El Salvador | Hunting Facebook's tracking tool | Beware scum apps
|
Jan 7 | Media organisations targeted | When training doesn't work | Pivoting to privacy | When rebooting an iPhone isn't what it seems | Norton's plan to use your computer to create cryptocurrency
|