Watch out for attacks that start with social engineering and sending convincing-looking emails targeted at companies
Locky, Cerber Ransomware Skilled at Hiding
Since January, a number of ransomware families are sharing a common infrastructure with different techniques allowing the malware to hide from detection systems.
Your Mac is not malware-proof: a look at the threats and defenses
What’s the state of play on malware for the Mac platform? We checked in with Sophos Labs for an update
DIY kits for sale on dark web spark rise of ransomware-as-a-service
These days you don’t need much skill to unleash ransomware – all you need is access to the dark web. So how can you protect yourself against ransomware?
Security chiefs join the chorus of concern about shoddy IoT devices
As security chiefs flag up their fears about vulnerable devices, we offer some tips to help you stay safe with the IoT
Honey, I Wiretapped the Kids [Chet Chat Podcast 259]
Here’s our latest security podcast – enjoy!
Secrets of the Filecode ransomware revealed
Cryptography can be fun! Our resident cryptosplainer Paul Ducklin shows how to recover from the Filecode ransomware without paying up.
Unholy trinity of AKBuilder, Dyzap and Betabot used in new malware campaigns
Betabot, Dyzap and AKBuilder join forces – but keeping Office up to date should keep you protected
Attackers using cracked builder to duplicate and spread Betabot
Some attackers love Betabot malware but not all of them like paying for it
News in brief: D-Link vulnerabilities; SHA-1 woe; MySQL hacks
Your daily round-up of some of the other stories in the news