News

  • Friday Squid Blogging: Creating Batteries Out of Squid Cells

    This is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail underneath its tentacle, it needs to regrow that tooth very rapidly, otherwise it can’t claw its prey,” he explains. This was intriguing news ­ and it sparked an idea in Hopkins lab where he’d been trying to […]

    Read More

  • A Hacker’s Mind News

    My latest book continues to sell well. Its ranking hovers between 1,500 and 2,000 on Amazon. It’s been spied in airports. Reviews are consistently good. I have been enjoying giving podcast interviews. It all feels pretty good right now. You can order a signed book from me here. For those of you in New York, […]

    Read More

  • Critical flaw in WooCommerce can be used to compromise WordPress websites

    WooCommerce, a popular plug-in for running WordPress-based online stores, contains a critical vulnerability that could allow attackers to take over websites. Technical details about the vulnerability have not been published yet, but the WooCommerce team released updates and attackers could reverse-engineer the patch. “Although what we know at this time is limited, what we do […]

    Read More

  • Spot and Remove Viruses from Your Android Phone

    So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several things to spot and remove them from your phone.  A couple things make Android phones attractive to cyber criminals and scammers. First, they make up about half of all smartphones in the U.S. and roughly 71% worldwide. […]

    Read More

  • CISA Unveils Ransomware Notification Initiative

    Provides businesses with early warnings to evict threat actors before they can encrypt data Read More

    Read More

  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites

    The vulnerability could allow an unauthenticated attacker to gain admin privileges and take over a website Read More

    Read More

  • GitHub Updates Security Protocol For Operations Over SSH

    The move reportedly did not stem from a compromise of GitHub systems or customer information Read More

    Read More

  • Cyberpion rebrands as Ionix, offering new EASM visibility improvements

    SaaS-based external attack surface management (EASM) company Cyberpion has rebranded as Ionix, at the same time adding a clutch of new cybersecurity capabilities to its namesake offering. Designed to provide a “wider coverage and deeper focus” into its customers’ internet-facing assets and connected dependencies, the revamp of Ionix’s system will feature new abilities such as extending […]

    Read More

  • Mobile Myths: Can My Apple Devices Get Hacked?

    “I bought a Mac, because it’s safer than a PC.”  “I always surf the web with my iPhone, because I know it can’t get infected.”  “I got a virus on my first PC, so now I only use Apple products.”  Sound familiar?  Too often, the rhetoric around the Mac vs. PC debate focuses on Apple’s […]

    Read More

  • Android-based banking Trojan Nexus now available as malware-as-a-service

    Italian cybersecurity firm Cleafy has found “Nexus”, a new Android Trojan capable of hijacking online accounts and siphoning funds from them, to be targeting customers from 450 banks and cryptocurrency services worldwide. First observed in June 2022 as a variant of SOVA, another Android banking Trojan, Nexus has since improved targeting capabilities and is available […]

    Read More