News

  • Samsung Source Codes Stolen

    Tech company confirms source codes for Galaxy devices among data snatched in cyber-attack Read More

    Read More

  • Extortion group teases 190GB of stolen data as Samsung confirms security breach

    South Korean consumer giant Samsung has reportedly suffered a major data breach with extortion group LAPSUS$ claiming to have access to 190GB of Samsung information. Ransomware is believed to be the attack method used by LAPSUS$ to target Samsung, which has confirmed a security breach of certain internal company data. The incident comes just a…

    Read More

  • Kids Back To School – The Perfect Time to Audit Your Family’s Online Safety

    When Aussie school opened their doors this year, the lifespan of parents around the country drastically improved. The combination of homeschooling, working from home, and not going anywhere has completely drained many Aussie working parents, me included!! Many of us have been in survival mode – just focusing on the basics to get through!  Well,…

    Read More

  • Helping Mom & Dad: Online Banking

    Editor’s Note: This is the first in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely…

    Read More

  • “Alexa, hack yourself” – researchers describe new exploit that turns smart speakers against themselves

    Researchers have discovered a novel way of exploiting Amazon Echo smart speakers to perform commands. They get the Amazon Echo speaker to say the commands to itself. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Intel adds security enhancements to vPro line

    Intel pulled the wraps off its latest vPro platform powered by its 12th Gen Core processors last week. The platform contains security enhancements including: Threat Detection Technology (TDT), a hardware-based way to detect ransomware in an efficient and timely manner Anomalous behavior detection to identify living-off-the-land and supply chain attacks Silicon-based capabilities that support the…

    Read More

  • Forcepoint ONE simplifies your security

    Graham Cluley Security News is sponsored this week by the folks at Forcepoint. Thanks to the great team there for their support! Remember when you thought an antivirus was all you needed to keep safe from digital danger? Of course, cybersecurity has never truly been that simple. As cyberthreats and business operations have grown more…

    Read More

  • Hacking Alexa through Alexa’s Speech

    An Alexa can respond to voice commands it issues. This can be exploited: The attack works by using the device’s speaker to issue voice commands. As long as the speech contains the device wake word (usually “Alexa” or “Echo”) followed by a permissible command, the Echo will carry it out, researchers from Royal Holloway University…

    Read More

  • Researchers find new way to neutralize side-channel memory attacks

    Researchers at the Massachusetts Institute of Technology have discovered a way to foil memory-timing side-channel attacks that’s more efficient than other methods. The attacks can be used to steal secrets such as cryptographic keys or user passwords stored in a computer’s memory. According to a report by the researchers, the attacks are enabled by shared…

    Read More

  •  ISO 27002 2013 to 2022 mapping

    On February 15th, the International Organization for Standardization (ISO), published the latest update to “ISO/IEC 27002 Information security, cybersecurity and privacy protection — Information security controls”. This latest standard is available for personal use from their site on ISO.org for CHF 198 (Swiss Francs) or, if you prefer, US dollars, $200, at the ANSI.org webstore.…

    Read More