by Paul Ducklin We’ve said this before, but we’ll repeat it again here: Imagine that you’d spoken in what you thought was total confidence to a psychotherapist, but the contents of your sessions had been saved for posterity, along with precise personal identification details such as your unique national ID . . . Read more
by Paul Ducklin If you’re a gamer or an avid squeezer of raw computing power, you’ve probably spent hours tweaking your motherboard settings to eke out every last drop of performance. Over the years, you might even have tried out various unofficial firmware bodges and hacks to let you change . . . Read more
Rogue software packages. Rogue “sysadmins”. Rogue keyloggers. Rogue authenticators. Rogue ROGUES!
Company transcribed ultra-personal conversations, didn’t secure them. Criminal stole them, then extorted thousands of vulnerable patients.
If the crooks have connected up your phone number and your Twitter handle… what could go wrong?
Wanted! Not only the extortionist who abused the data, but also the CEO who let it happen.
Latest episode – listen and read now! Use our advice to advise your own friends and family… let’s all do our bit to stand up to scammers!
It’s a simple jingle and it’s solid advice: “If in doubt, don’t give it out!”
“Change your code to improve cryptomining”… or we’ll dump 1TB of stolen secrets.
You’d spot this one a mile away… but what about your friends or family?