Ransomware crooks launch customer service website

Now here’s a first — crooks who realize the importance of customer service. It’s the latest twist in the global CryptoLocker ransomware attack. This diabolically nasty malware locks up all of the victim’s personal files — and in some cases, backup files, too — with state-of-the-art encryption. The bad guys have the only decryption key and […]

Posted in: Fraud & Scams, Microsoft/Windows, Security, Vulnerabilities by Zac Comments Off on Ransomware crooks launch customer service website , , , , ,

A-Doh!-Be hit by ‘sophisticated’ Cyber Attack

Adobe’s systems have been hit by numerous “sophisticated attacks” that have compromised the information of 2.9 million customers, and accessed the source code of Adobe products. The company said on Thursday that it has been the victim of a major cyberattack and said hackers had accessed those millions of customer IDs and encrypted passwords. “We also believe […]

BCC’d or not BCC’d – Wordfence

I received the below email with nice friendly information and updates regarding the popular WordPress plugin Wordfence, a very popular and familiar to some, Security oriented plug-in for WordPress. However, this email had a nasty bite to it. In the form of having been sent to a mailing list of 5000+ recipients without using the ‘BCC’ field. There really isn’t […]

Disabling Java Plug-ins

In recent years, the Java development platform has become a favored target for hackers, leading to a growing list of Java-specific vulnerabilities being discovered and exploited by various malware. As such, many security researchers and national computer security organizations caution users to limit their usage of Java, unless required for business reasons, or to remove […]

MasterCard, VISA Warn of Processor Breach – 10,000,000 credit cards potentially compromised

VISA and MasterCard are alerting banks across the country about a recent major breach at a U.S.-based credit card processor. Sources in the financial sector are calling the breach “massive,” and say it may involve more than 10 million compromised card numbers. Update, 4:32 p.m. ET: Atlanta-based processor Global Payments just confirmed that they discovered a breach in early March 2012. […]

Work Experience

As someone who has worked with many trainees, work placements and apprenticeships over the years it still surprises’ me the lack of enthusiasm some within the IT community have when it comes to taking someone trying to enter the industry under their wing. Whether it be for a day a week or upto two years […]

Cyber Security Challenge UK announces first finalists

  Sophos HQ in Abingdon on Saturday 14th January was the scene for the first face-to-face encounter in this year’s Cyber Security Challenge UK. Thirty talented candidates from across the UK battled in a malware hunt which exposed them to some of the criminal world’s nastiest pieces of malicious code, housed within the Sophos vaults.

TheRegister.co.uk – Ensuring SPAM emails live on

 It seems the team at the popular tech news and review site TheRegister.co.uk didn’t quite have enough Coffee this Monday morning as they mistakenly sent an email out to 3,521 of it’s subscribers with the email address details of 46,524 of it’s readers. It seems a lot less people subscribe than actually read the articles. The following […]

Security precautions for mobile business applications

By ForHacSec.com columnist – Fergal Glynn at Veracode.com Mobile applications have become one of the hottest trends, but this has come at a price. The sharp rise in popularity means businesses are rushing their apps to the market, while security has taken a back seat. Neither the developers, nor the app stores, test web applications […]

Digital Security Degrees – Yes? No? Maybe…….

I’ve had a few emails recently from people wanting to know more about Digital Forensic/Ethical Hacking degrees. People may be thinking I’m a little biased having invested countless thousands of pounds, man hours and sweat in to the course so far. However, isn’t everyone a little biased… The term Ethical Hacking comes under many headings, […]