File-less malware attacks leave little trace, which makes them all the more threatening. A file-less malware attack doesn’t even need to install software on a victim’s machine and is instead based on an attacker taking control of something already installed on your computer. A file-less malware attack often latches onto a built-in component of Windows … More What exactly is a file-less malware attack and how could it affect your business?
Security researchers have demonstrated how attackers could cause physical damage to hard drives, and cause PCs to crash, just by playing sounds through a computer’s speaker. A denial-of-service (DoS) attack against your organisation’s website is bad enough, preventing customers from reaching your online presence and perhaps preventing you from processing new orders – but imagine the chaos … More An acoustic attack can blue screen your Windows computer
I was a young mathematics professor at Massachusetts Institute of Technology (MIT) when I read Richard Dawkins’ description of memes. I recall thinking: “Oh, that’s how it all works”. Memes are a generalization of genes, and, among other things, they include your beliefs. After studying memes for many decades, I have come to think that they are … More Memes: the explanation of nearly everything – including computer viruses
Cybercrime and other forms of “cyber-badness” affect different professions in different ways. Recently I participated in a panel about the cybersecurity concerns of journalists and the news media, hosted by the Inter America Press Association (IAPA). An account of the panel was published on WeLiveSecuritylast month but in this article I want to pass along some of the … More Cybersecurity for journalists and the news media
Reviewing a lease, preparing a favorite recipe, applying for a loan … these are all things a typical college student might ask parents how to do. But these days, students are more likely to turn to a quick internet search for answers to just about everything. Parents, however, still tend to depend on their children … More Having “the talk” with parents — the tech talk, that is
I’ve just about recovered from the sensory overload that is CES to gather my thoughts from what was another fascinating event. This blog, on connected car hacking, is the first of two posts. New cars are networked computers with an engine attached. Yours doesn’t sync with your phone when it detects you driving? That’s so … More Connected car hacking: Who’s to blame?
The latest report states 77 computers, laptops, mobiles, were lost or stolen from HSE in the last 5 years. Ok, 5 years, means approximately since 2010/11. But they couldn’t exactly account for all of them before that either. A headline from 2008 says 55 HSE laptops go missing, then three more in 2009 and a … More What’s happening with HSE’s lost computers?