News

  • Apple’s Private Relay Is Being Blocked

    Some European cell phone carriers, and now T-Mobile, are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot thread. Read More

    Read More

  • Hacking group accidentally infects itself with Remote Access Trojan horse

    Patchwork, an Indian hacking group also known by such bizarre names as Hangover Group, Dropping Elephant, Chinastrats, and Monsoon, has proven the old adage that to err is human, but to really cock things up you need to be a cybercriminal. Read More

    Read More

  • Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

    Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation. Next-generation firewalls…

    Read More

  • Protecting Your Privacy This Year

    If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal identities are worth looking out for. We have your back. And here’s why.  In the U.S., reported cases of identity theft continue to rise. Comparing the first three quarters of 2020 to the first…

    Read More

  • Free guide: “A Journey to Zero Trust With Zero Passwords”

    Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide by the analysts at The Cyber Hut looks at how Zero Trust increases business agility and provides practical guidance for eliminating passwords to accelerate your Zero Trust strategy. Passwordless MFA…

    Read More

  • Multi-Factor is incomplete without backup codes

    This blog was written by an independent guest blogger. I was logging into one of my favorite online shopping sites the other day, and, as with all my other sites, I was presented with the multi-factor authentication prompt to complete the login process.  Anyone who knows me, knows that I have been a long-time supporter…

    Read More

  • 500M Avira Antivirus Users Introduced to Cryptomining

    Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn’t alone in this dubious endeavor: Avira antivirus — which has built a base of 500 million users worldwide largely by making the product free…

    Read More

  • The Spine Collector: Man arrested for using fake email addresses to steal hundreds of unpublished manuscripts

    For years, “The Spine Collector” has been haunting publishers around the world, attempting to steal manuscripts by famous authors. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Attack misuses Google Docs comments to spew out “massive wave” of malicious links

    Security researchers say they have seen a “massive wave” of hackers exploiting the comment feature in Google Docs to spread malicious content into the inboxes of unsuspecting targeted users. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Norton 360 Now Comes With a Cryptominer

    Norton 360, one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. Norton’s parent firm says the cloud-based service that activates the program and allows customers to profit from the scheme — in which the company keeps 15 percent of any currencies mined —…

    Read More