‘Wormable’ Flaw Leads January 2022 Patch Tuesday
Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving...
Apple’s Private Relay Is Being Blocked
Some European cell phone carriers, and now T-Mobile, are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot...
Hacking group accidentally infects itself with Remote Access Trojan horse
Patchwork, an Indian hacking group also known by such bizarre names as Hangover Group, Dropping Elephant, Chinastrats, and Monsoon, has proven the old adage that...
Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases
Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled...
Protecting Your Privacy This Year
If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal identities are worth looking...
Free guide: “A Journey to Zero Trust With Zero Passwords”
Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide...
Multi-Factor is incomplete without backup codes
This blog was written by an independent guest blogger. I was logging into one of my favorite online shopping sites the other day, and, as...
500M Avira Antivirus Users Introduced to Cryptomining
Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining...
The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts
For years, "The Spine Collector" has been haunting publishers around the world, attempting to steal manuscripts by famous authors. Read more in my article on...
Attack misuses Google Docs comments to spew out “massive wave” of malicious links
Security researchers say they have seen a "massive wave" of hackers exploiting the comment feature in Google Docs to spread malicious content into the inboxes...