-
‘Wormable’ Flaw Leads January 2022 Patch Tuesday
Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is “wormable,” meaning no…
-
Apple’s Private Relay Is Being Blocked
Some European cell phone carriers, and now T-Mobile, are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot thread. Read More
-
Hacking group accidentally infects itself with Remote Access Trojan horse
Patchwork, an Indian hacking group also known by such bizarre names as Hangover Group, Dropping Elephant, Chinastrats, and Monsoon, has proven the old adage that to err is human, but to really cock things up you need to be a cybercriminal. Read More
-
Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases
Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation. Next-generation firewalls…
-
Protecting Your Privacy This Year
If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal identities are worth looking out for. We have your back. And here’s why. In the U.S., reported cases of identity theft continue to rise. Comparing the first three quarters of 2020 to the first…
-
Free guide: “A Journey to Zero Trust With Zero Passwords”
Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide by the analysts at The Cyber Hut looks at how Zero Trust increases business agility and provides practical guidance for eliminating passwords to accelerate your Zero Trust strategy. Passwordless MFA…
-
Multi-Factor is incomplete without backup codes
This blog was written by an independent guest blogger. I was logging into one of my favorite online shopping sites the other day, and, as with all my other sites, I was presented with the multi-factor authentication prompt to complete the login process. Anyone who knows me, knows that I have been a long-time supporter…
-
500M Avira Antivirus Users Introduced to Cryptomining
Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn’t alone in this dubious endeavor: Avira antivirus — which has built a base of 500 million users worldwide largely by making the product free…
-
The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts
For years, “The Spine Collector” has been haunting publishers around the world, attempting to steal manuscripts by famous authors. Read more in my article on the Hot for Security blog. Read More
-
Attack misuses Google Docs comments to spew out “massive wave” of malicious links
Security researchers say they have seen a “massive wave” of hackers exploiting the comment feature in Google Docs to spread malicious content into the inboxes of unsuspecting targeted users. Read more in my article on the Tripwire State of Security blog. Read More