Profile

Cover photo
4,474 followers|2,430,248 views
AboutPostsPhotosVideos

Stream

Naked Security

Shared publicly  - 
 
The great data hoover turns on the rest of us
Ever since it launched it’s Like button in early 2009 Facebook has been installing windows on the web.
3
2
Richard Parsons's profile photo
 
And the advertising community wonder why more and more people install Ad-Blockers
Add a comment...

Naked Security

Shared publicly  - 
 
A US federal judge has excluded all evidence that was acquired by the FBI through malware planted on the Tor network.
A US federal judge has excluded all evidence that was acquired by the FBI through malware on the Tor network.
12
7
Add a comment...

Naked Security

Shared publicly  - 
 
What is pastejacking, and should you be worried?
Just when you thought it was safe to delve into your clipboard.
5
2
Add a comment...

Naked Security

Shared publicly  - 
 
The company says its can take one look at you and identify whether you’ve got the face of an expert poker player, a genius, an academic, a pedophile, or a terrorist.
As in, “Excuse me, you’d best come with us: your philtrum has a suspicious shape to it, and we’re adverse to the symmetry of your lips.”
4
Jim MacLachlan's profile photoPaul Gray's profile photo
2 comments
 
You can't, otherwise racisim would be taught in schools as a science!
Add a comment...

Naked Security

Shared publicly  - 
 
Haven't upgraded to Windows 10? You might not have a choice in the matter anymore...
Actually, you can refuse it, but you might accept it anyway. (It’s free, at least for now.)
2
2
Austin Arrowsmith's profile photo
 
You always have a choice... Find a different OS! (Sure, corporate life is different, but personally, you can always choose something else)
Add a comment...

Naked Security

Shared publicly  - 
 
Paying the ransom doesn't always work
The hospital paid one ransom, but didn’t get all its files back.
6
4
Thomas Frost's profile photoPaul Gray's profile photoGeorge Greene's profile photo
5 comments
 
Experience is what pass over sadly for those with certs .. I I have show time after time certs limit you security if there no field experience. passing people with years of experience is foolish.
Backup are great, but what if the backup have the parts of the bug that lets the bad guys in the back door again? My experience all data is suspect till checked.  Restore in a slow restore with validation of data and out side connection limited.  Unless they love paying the ransom they need to rethink their IT solutions.
The other shoe to drop is the type data taken?  
Add a comment...
Have them in circles
4,474 people
RN Hindarwan's profile photo
Oleg White's profile photo
Darvinder Sawhney's profile photo
i.r.mug's profile photo
Oscar de la Peña's profile photo
Darren Smith's profile photo
Omodoyinsola Bode-Fakunle's profile photo
Randy Brooks's profile photo
dinesh kumar's profile photo

Naked Security

Shared publicly  - 
 
Reading the privacy policy wouldn't have helped
His US presidential bid went belly-up, and he’s selling email addresses to pay it off.
1
Add a comment...

Naked Security

Shared publicly  - 
 
Who might want to load the dice against Tor?
Randomness is vital to cryptography, and cryptography is vital to Tor. But what if you can’t see the other Tor nodes rolling their dice?
1
1
Add a comment...

Naked Security

Shared publicly  - 
 
Congratulations, Jennifer Lawrence, et al: one of the Celebgate nude-photo thieves has just pled guilty to invading your private life.
This isn’t over yet. Ryan Collins pled guilty to phishing, but he hasn’t been linked to sharing or uploading the stolen images from “celebgate”.
4
1
Add a comment...

Naked Security

Shared publicly  - 
 
With the doors wide open, he was able to issue fraudulent airline tickets whenever he liked.
He targeted travel agencies and websites in an international phishing campaign that lasted for more than three years.
1
Add a comment...

Naked Security

Shared publicly  - 
 
Listen up young'ns
Now get off my lawn, you 2FA-disrespecting young’ns.
2
1
Add a comment...

Naked Security

Shared publicly  - 
 
The vulnerability affects computers that are using WPAD
Poorly configured networks and new rules on internet domain names are giving cybercriminals a powerful new attack tool.
4
2
Add a comment...
People
Have them in circles
4,474 people
RN Hindarwan's profile photo
Oleg White's profile photo
Darvinder Sawhney's profile photo
i.r.mug's profile photo
Oscar de la Peña's profile photo
Darren Smith's profile photo
Omodoyinsola Bode-Fakunle's profile photo
Randy Brooks's profile photo
dinesh kumar's profile photo
Contact Information
Contact info
Email
Story
Tagline
Computer security news, opinion, advice and research from Sophos
Introduction
Computer security news from Sophos.

Visit http://nakedsecurity.sophos.com for more information