Flux RSS

— Sources secondaires
Smashing Security podcast #459: This clever scam nearly hijacked a tech CEO’s Apple ID
Gouvernance & RégulationGraham Cluleyil y a 9 jours

In episode 459 of Smashing Security, we dive into a chillingly clever account takeover attempt targeting WordPress co-founder Matt Mullenweg - involving MFA fatigue, real Apple alerts, a convincing support call, and a phishing page that oh-so-nearly worked. If a famous techie could have this happen to you, can you be sure you're immune? Plus: would you donate your lifetime medical history to science if you were promised anonymity? We unpack serious concerns around UK Biobank, where “de-identified” data may not be as anonymous as you think — and how surprisingly little information it takes to reveal everything. And! Human-powered “AI”, and a punishment worse than prison: eight hours on the RSA expo floor... All this, and much more, in episode 459 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Paul Ducklin.

Fraudsters are using public planning records to target permit applicants
Gouvernance & RégulationGraham Cluleyil y a 15 jours

If you're in the middle of applying for a planning or zoning permit, there is some unwelcome news: cyber-criminals have found a way to exploit the bureaucratic tedium of the process against you. Read more in my article on the Fortra blog.

Smashing Security podcast #457: How a cybersecurity boss framed his own employee
Gouvernance & RégulationGraham Cluleyil y a 23 jours

When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker... who promptly sent an innocent colleague into a career-ending ambush. In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling zero-day exploits to a Russia-linked broker. Plus: are nation states quietly poisoning AI models to bend reality itself? We explore how “foreign information manipulation interference” could target not just social media users, but the large language models we increasingly trust for answers — and what that might mean for truth, trust, and the future of online influence. All this, and much more, in episode 457 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Carl Miller.

They seized $4.8m in crypto… then gave the master key to the internet
Gouvernance & RégulationGraham Cluleyil y a 24 jours

South Korea's National Tax Service (NTS) has found itself in the middle of a deeply embarrassing - and costly - blunder after accidentally handing thieves the master key to a seized cryptocurrency wallet. Read more in my article on the Hot for Security blog.

Smashing Security podcast #456: How to lose friends and DDoS people
Gouvernance & RégulationGraham Cluleyil y a 30 jours

When the mysterious operator of an internet archiving-service decided to silence a curious Finnish blogger, they didn’t just send a stroppy email - they allegedly weaponised their own CAPTCHA page to launch a DDoS attack, threatened to invent an entirely new genre of AI porn, and tampered with parts of their own archive to smear the blogger's name. In this episode, we unravel how a website designed to preserve history may have trashed its own credibility - and how Wikipedia responded when trust went out the window. Plus a ransomware gang shoots itself in the foot with a classic case of buffoonery, accidentally corrupting the very keys victims would need to decrypt their data. When even the criminals can’t unlock your files, what happens next? All this, a surprisingly zen Pick of the Week, and a gloriously splenetic rant against web forms, on episode 456 of the award-winning "Smashing Security" podcast, with cybersecurity veteran Graham Cluley and special guest Paul Ducklin.

Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch
Gouvernance & RégulationGraham Cluleyil y a 37 jours

Could America turn off Europe's internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech sovereignty. Could Gmail, cloud services, and critical infrastructure really become geopolitical leverage? And is anyone actually building a Plan B? Plus we explore if Meta is quietly plotting to turn its smart glasses into face-recognising surveillance specs? With reports of internal memos suggesting they plan to launch controversial features while everyone’s distracted by political chaos, we ask: is this innovation really wanted by the public... or something far creepier? All of this, and much more, in episode 455 of the award-winning "Smashing Security" podcast with cybersecurity veteran Graham Cluley, joined this week by journalist and author James Ball.

The near-term impact of AI on the cyber threat
Gouvernance & RégulationNCSC UKil y a 794 jours

An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.

Cyber Threat Report: UK Legal Sector
Gouvernance & RégulationNCSC UKil y a 1 010 jours

An updated report from the NCSC explaining how UK law firms - of all sizes - can protect themselves from common cyber threats.

Active Cyber Defence (ACD) - the fourth year
Gouvernance & RégulationNCSC UKil y a 1 783 jours

The year four report covers 2020 and aims to highlight the achievements and efforts made by the Active Cyber Defence programme.

Active Cyber Defence (ACD) - The Third Year
Gouvernance & RégulationNCSC UKil y a 1 863 jours

The year three report covers 2019 and aims to highlight the achievements and efforts made by the Active Cyber Defence programe.

The cyber threat to sports organisations
Gouvernance & RégulationNCSC UKil y a 2 074 jours

The NCSC report highlights the cyber threats faced by the sports sector and suggests how to stop or lessen their impact on organisations.