An unnamed group of hackers have targeted a developer of highly popular video games.
Read more in my article on the Hot for Security blog.
An unnamed group of hackers have targeted a developer of highly popular video games.
Read more in my article on the Hot for Security blog.
If you wanted to buy Bitcoins, or - gulp! - needed to buy Bitcoins, would you know how?
David Bisson talks you through the process.
It doesn’t matter if you’re a regular computer user or a notoriously short-fused celebrity chef, we all need to harden the defences of our email accounts.
Read more in my article on the Tripwire State of Security blog.
A type of Android malware known as Dvmap hid in apps available in the official Google Play store in order to inject malicious code into system runtime libraries.
David Bisson reports.
In this latest edition of the "Smashing Security" podcast, the team are joined by Ian Whalley to discuss NSA leaks, the secret yellow dots on your printouts, careless cloud security and Gordon Ramsay's entanglement with hackers.
David Bisson explains the difference between the different types of cookie.
An annoying Android app asks a user to grant it administrator rights in order to display ads that lead to potential drive-by downloads.
David Bisson reports.
In our pursuit of greater security, we must not throw away our fundamental human rights for privacy.
The Intercept might have unwittingly helped unmask Reality Winner, a government contractor who allegedly leaked a NSA document about Russian hacking to the news outlet.
David Bisson reports.
Big companies like British Airways have a variety of safety nets in place. Should one system fail, then it should be easy to switch over to another.
So how did things go so badly wrong?
QakBot (also known as PinkSlip) relies on exploit kits and spam campaigns to target unsuspecting webmail users.
David Bisson reports.
In the wake of terrorist attacks in the UK, politicians are beating a familiar drum: it's the internet's fault.
David Bisson explains how users of the stock Android brower can clear their caches, browsing history, and cookies for better privacy.
Many thanks to the great folks at VASCO, who have sponsored my writing for the last week.
Mobile apps are hard to secure because they are often written with no built-in security. Delivering secure mobile apps requires invisible technologies, which assesses the integrity of the mobile app, and behaviometrics, which accurately authenticates users by the unique way they interact with their device. The net result is a more secure and frictionless mobile transaction experience.
More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.
Download VASCO's 10-page white paper to learn how to:
Interested in learning more? Download VASCO's white paper about Invisible Security Technologies and Behaviometrics now.
If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
A new family of malware called Fireball has infected more than 250 million computers worldwide thanks to some crafty monetizing.
David Bisson reports.
Email security matters. Check out this free webinar where I discuss the threats.
If you have an article that you’d like to share on grahamcluley.com, check out our contributor guidelines.
