Latest episode – listen now!
Want to know more about this topic or about us? Contact us!
Latest episode – listen now!
Once more unto the breach, dear friends, once more…
by Paul Ducklin [00’38”] Learning from computer virus history. [02’26”] The PrintNightmare saga continues. [05’27”] Apple puts out a patch, but doesn’t say why. [08’12”] Snitch on a crook and earn $10 million. [17’50”] Scammars do grammer and speeling correctly. [25’12”] And the Business Email Compromise that wasn’t. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. . . . Read more
by Paul Ducklin [01’32”] We explain how a format string bug could lock your iPhone out of your own network. [08’53”] We revisit the PrintNightmare saga, which is sort-of fixed but not really. [12’50”] We look back at the 20-year-old Code Red virus. [18’30”] We look at what cybercriminals spend money on (hint: more cybercrime). [29’10”] And in this . . . Read more
by Paul Ducklin Here on Naked Security, we’ve regularly asked the question, or at least implied it: “Where do you think all those cybercrime payments go?” When a ransomware victim hands over a largely anonymous, mostly untraceable quantity of Bitcoin, for example, to pay off a multi-million dollar blackmail demand . . . Read more
by Paul Ducklin It’s like the movie Independence Day, but with the malware part of the story back-to-front. In the 1996 Jeff Goldblum classic, the bespectacled, academic antihero finally quashes the alien invaders by connecting to their mothership with his Mac laptop and uploading a computer virus that even the . . . Read more
by Paul Ducklin [05’06”] Ukrainian cops bring out the BFG (Big Fearsome Grinder) and cut open some doors. [10’23”] A repeated request for destructive Linux code enters its 15th year. [19’39”] Peloton exercise bicycles found to be rootable. [28’43”] What’s the point of paying ransomware money? [33’53”] Oh! No! of the week With Kimberly Truong, Doug Aamoth and . . . Read more
by Paul Ducklin Governments and law enforcement hate it when ransomware victims pay the blackmail demands that almost always follow a ransomware attack, and you can understand why, given that today’s payments fund tomorrow’s cybercriminality. Of course, no one needs to be told that. Paying up hurts in any number . . . Read more
by Paul Ducklin The 5-minute video is well worth watching. You don’t need to be fluent in Ukrainian to understand the shouted command: “Open up, Police!” There’s a moment of indecision, with the camera lingering on the sort of front door that looks a bit more rugged than yours or . . . Read more
by Paul Ducklin Apple’s brand new AirTag product got hacked already. Things you can learn from Colonial Pipeline’s ransomware misfortune. Why Dell patched a bunch of driver bugs going back more than a decade. And the “Is it you in the video?” scam just keeps on coming back. With Kimberly . . . Read more