Fruitfly malware spied on Mac users for 13 years

US authorities have charged a 28-year-old Ohio man who is alleged to have created and installed creepy spyware on thousands of computers for 13 years. Phillip R. Durachinsky, of North Royalton, Ohio, is alleged to have used Mac malware known as “Fruitfly” to remotely control victims’ computers, access and upload files, grab screenshots, log keystrokes, and surreptitiously … More Fruitfly malware spied on Mac users for 13 years

ISF predicts increasing impact of data breaches next year

The number, magnitude and costs of data breaches are all set to continue on their upward trajectories in the coming year, according to a forecast by the Information Security Forum (ISF). This prediction is included in their Global Security Threat Outlook for 2018 and comes with a warning that the stakes are now “higher than ever before”. … More ISF predicts increasing impact of data breaches next year

Shipping giant refuses to pay hackers ransom after data stolen

Clarksons, the global shipping firm, has turned the tables on criminal hackers who attempted to extort a ransom payment after stealing confidential information from the company’s network. The business, which is thought to have suffered a breach at the hand of hackers earlier this month, has warned that the hackers may release some of the … More Shipping giant refuses to pay hackers ransom after data stolen

Transparency of machine-learning algorithms is a double-edged sword

The European Union’s General Data Protection Regulation (GDPR), which will come into force on May 25, 2018, redefines how organizations are required to handle the collection and use of EU citizens’ personal data. Debates around the GDPR focus mostly on the global reach of this legislation, the draconian fines it introduces, or its stricter rules for “informed … More Transparency of machine-learning algorithms is a double-edged sword

Five tips for keeping your database secure

When we give privacy or security advice, we usually talk about strong passwords, backing up your data, using security applications, keeping systems up to date, and avoiding default settings. In general, these are the most basic and essential precautions any systems manager must consider. However, depending on the system you want to protect, there are … More Five tips for keeping your database secure

Securing printed data in the ‘paperless’ office

While we are supposedly in the era of the paperless office, intentional leaks via printed documents remain very common and can be just as damaging as their digital counterparts. While most of us realize the necessity of paper, do we recognize the risks of unauthorized viewing or document removal from the worksite? Data loss – … More Securing printed data in the ‘paperless’ office