What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in security threats

Apple patches dangerous security holes, one in active use – update now!

by Paul Ducklin We’ve seen several news stories talking up some great new features in Apple’s latest software update for iOS, which was released yesterday. However, we’re much more interested in the security patches that arrived in the update to iOS 14.6, because Apple fixed 38 significant bugs, covered by . . . Read more

S3 Ep19: Chrome zero-day, coffee hacking and Perl.com stolen [Podcast]

by Paul Ducklin We delve into Google’s tight-lipped Chrome bugfix, explain how a Belgian researcher awarded himself 111,848 cups of coffee, and discuss the audacious but thankfully temporary theft of the Perl.com domain. With Kimberly Truong, Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. LISTEN NOW . . . Read more

Ghost hack – criminals use deceased employee’s account to wreak havoc

by Paul Ducklin Many, if not most, organisations will tell you that they have processes and procedures that they follow when employees leave. In particular, most companies have a slick and quick procedure for removing ex-staff from the payroll. Firstly, it doesn’t make economic sense to pay someone who is . . . Read more

Ready to take the red pill? Catch up with Keren Elazari at Sophos Evolve

by Sally Adam Keren Elazari is a cybersecurity analyst and senior researcher at the Tel Aviv University Interdisciplinary Cyber Research Center. She focuses on hackers and technology, and their social implications. Keren believes, just like Neo in The Matrix, that the cybersecurity industry is facing a simple choice. Keep doing . . . Read more

Special minisode: “20 years of cyberthreats that shaped infosec” [Podcast]

by Paul Ducklin Naked Security’s Paul Ducklin interviews Sophos expert John Shier about his recently published paper, “20 years of cyberthreats that shaped information security“. Join John on a dizzing journey all the way from legendary viruses such as ILOVEYOU and Code Red, which flooded the internet in 2000, to . . . Read more

QR Codes: A Sneaky Security Threat

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.