Dec 18 | The "Pearl Harbor" of cyber espionage | Privacy wars | A first fine from the Irish data protection regulator | Regulating big tech | Trump's Twitter password really was MAGA2020! | The latest threats |
Dec 11 | FireEye shows us no-one's safe | Cybercrime; the $1 trillion business | The reality of spyware and surveillance | Who's afraid of quantum computing | Holding big tech to account | The latest threats |
Dec 4 | Ransomware bites Banijay | An 'extraordinary' iPhone vulnerability | Remote working | Spying on cellphone users | Microsoft's reverse ferret | The latest threats |
Nov 27 | The ransomware plague | Undermining freedom of information | Workplace surveillance | Big business, poor security | EU defence ministers and their not so secret video call | This week's key threats |
Nov 20 | Out-of-date browsers | Crime and artificial intelligence | This year's lousy passwords | Google, Apple and privacy | New guidance on subject access requests |
Nov 13 | The internet and cyber warfare | Authentication and text messages don't mix | What political parties have been up to with our personal data | UK/Japan trade deal | No, the EU isn't about to break encryption | The latest threats | Apple's big announcements |
Nov 6 | The poison of disinformation | Facial recognition | Router TLC | Ransomware | Weaponising VPNs | This week's key threats | And...football, baldness and artificial intelligence |
Oct 31 | The reality of cyber warfare, part 2 | Conferences and spies | A credit reference agency, our data, its profits | Wilful ignorance | Psychotherapy patients blackmailed | This week's key threats
|
Oct 23 | The risk of an uncontrolled cyber arms race | This week's key threats | Google sued | The gory details behind the Twitter hack | Deep nudes | Why verification codes as text messages are less than ideal
|
Oct 16 | The extraordinary saga of BA's data breach | Apple's (in)security | Threat roundup | Phishing kits | Lifting the lid on Business Email Compromise | Singapore's horror camera hack
|
Oct 9 | The state of cybercrime according to Europol | Threat roundup | Cyber mercenaries | More advice for remote working | What a chastity belt has to tell us about internet-connected devices | EU-UK data transfers
|
Oct 2 | Spyware targeting Macs | Threat roundup | Awareness (i.e. lack of) | Remote advice | Authorisation attacks | Mitigating insider risk
|
Sep 25 | Test and trace app rolls out in England and Wales | Threat roundup | The inside risk | Teen tech support | Iran targets 2FA | The real world cost of ransomware
|
Sep 18 | The cybersecurity pandemic | This week's key threats | Weaponising personal data | Facebook's vision of the future | Hacking for country and for profit | Why old phone numbers are a big security risk
|
Sep 11 | US data transfers; the temperature rises | Threat roundup | A remote fail that cost $7.5 million | What to do when it hits the fan | Cybersecurity companies' epic fail
|
Sep 4 | Election challenges | Threat round-up | A warning for CEOs | Tax avoidance | FBI cybersecurity advice | No place to hide online
|
Aug 28 | Cyber mercenaries | Threat round-up | The new world according to Microsoft | Media targeted | An object lesson in how not to be secure | Reality bites the online ad business
|
Aug 21 | Business Email Compromise surges | This week's threat round-up | Remotely oblivious | Wikileaks accused | Crossing the US border | Breaches down, data up
|
Aug 14 | Lessons from penetration testers...and from North Korea | Threat roundup | Privacy Shield refuses to die | Facial recognition ruling | The recruiters who stalk social media | Data protection and the A-level shambles
|
Aug 7 | Zoom security | Teenagers and that Twitter attack | This week's threats | The "alarming" pace of cybercrime | US efforts to isolate China | Amazon's window into our souls
|
Jul 31 | Beware ransomware | The latest scams (a bunch of them) | Dissecting disinformation | Tech giants testimony | Transatlantic data | Anonymous email addresses are good for you
|
Jul 24
| Twitter's security failure | The latest scams | Post Brexit data transfers | Iranian cyber spies show us their workings | Reducing human error | US surveillance
|
Jul 17 | Twitter's devastating security breach | Blowing up EU/US data transfer structures | Media businesses under attack | Cyber warfare | Free tools to help secure remote workers | Should you buy a Huawei phone?
|
Jul 10 | The lunatic scale of credential theft | Scumwatch (or, everyone wants a piece of Microsoft 365) | Securing conference calls | Risks of personal devices | The Chinese challenge | The threat to online shopping sites
|
Jul 3 | Beware ransomware | Contact tracing pivot | Scams galore | The Chinese cyber threat | Router warning (sorry, another one)
|
Jun 19 | CIA insecurity | Scumwatch | Contact tracing U-turn | Disinformation at scale | Modern sleuthing
|
Jun 12 | Hacking at scale | Tracking tribulations | The latest scams | Email security | Pin codes and counter-intuition | Backdoors | (Plus, AI journalism problems, and 'Peg Leg'; the router you can implant...yes, in your leg.)
|
Jun 5 | Remote working realities | This week's scams | Zoom and silver linings | Securing cloud storage | Data retention guidance | Not so private browsing
|
May 29 | Contact tracing | Crime on the cheap | GDPR and the terrible twos | Bad bosses | YouTube and censorship | The power of metadata
|
May 22 | Tracking, tracing and lack of collaboration | Clever phishing kits | Questions for easyJet | Beer app threatens national security | Remote working tips from a 100% remote company | Cock-ups and cash behind most breaches
|
May 15 | Scams; COVID-19 and otherwise | Contact tracing lessons from Iceland | iPhone security "f**ked" | Remote working security | Disinformation | California's GDPR
|
May 8 | Relentless rise in coronavirus cyber attacks | UK tracing app meets reality |Cookies, consent and compliance | Journalism security | Remote risks | WeChat censorship
|
May 1 | Academics call for tracing pledge | Online fraud reaches "highest attack rate ever" | Less security, higher risk, bad idea | Fingerprint fine | Illegal streaming dangers | Video meeting risks
|
Apr 24 | Scumbag scammers reach new lows | Google and Apple make contact tracing progress | Disinformation | iPhone Mail app risks | Video conferencing improvements - and epic fails | Remote working reveals wider problems
|
Apr 17 | Contact tracing | Scamwatch | Remote working update | Cloudflare's problematic patch panel | To Zoom, or not to Zoom...
|
Apr 10 | The uphill struggle against misinformation | Cyber crime Contact tracing and privacy | Zoom; to ban or not to ban | Backups | Security lessons from Google
|
Apr 3 | Surveillance, health and privacy | Zoom under fire | Coronavirus scams | Spoofing the media | Vicarious liability | Marriott breached again
|
Mar 27 | Surveillance | Remote working update | Coronavirus scams | Another rise in cyber attacks | Netflix users under siege
|
Mar 20 | Exploiting a pandemic | Advice on remote working | Disclosing data breaches | Surveillance and the virus | Advice on data protection | The UK, the EU and privacy
|
Mar 13 | Virgin's data breach | Exploiting coronavirus | Tracking | Whisper's open secrets | Hacking the cloud | Scraping our data
|
Mar 6 | Home-working | IoT advice | Multi-factor authentication | Facial recognition | Public WiFi | DMARC
|
Feb 28 | The risks of mobile devices | Hacking WiFi | Browser privacy | Password mismanagement | Covid-19 | Defending against Magecart | New guidance on ransomware
|
Feb 21 | A $2.6m email | Google moves on Brexit | The lure of the honeypot | Compromising social media | Surveillance threat | The spread of stalkerware
|
Feb 14 | Mac attack | The secret of the 'social proof nudge' | Data breach mayhem | The cybercrime business | Supply chain risks | Spies
|
Feb 7 | The Ashley Madison saga | Impersonating journalists | Top ten hall of shame | UK local government | Public WiFi; risk or not? | Evil cleaners
|
Jan 31 | Avast caught red-handed | Targeting a journalist | Reporting the Bezos affair | UN breached, covers up, found out | Simple Mac malware; simple solution | Facebook doesn't want to be liked |
Jan 24 | Hacking the richest man in the world | The end of privacy | Mind control | Spilling children's details | Exploiting job seekers | The Internet of short-lived Things |
Jan 17 | Helping organisations to help themselves | Encryption hostilities resume | EU regulators challenged to act | Inattentional blindness | Hijacking conversations | Crucial updates |
Jan 10 | The Travelex affair | Facebook and disinformation | Fooled by social engineering | Insider risks | NGOs targeted by China |Ring responds to security questions |
Jan 3 | Key issues for a new year and a new decade |