Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Kim Crawley

MysteryBot: Do You Do Your Banking on Your Phone?

Posted on July 11, 2018 by Kim Crawley

MysteryBot is a particularly nasty new Android ransomware that is still evolving. It targets popular banking apps by displaying fake login screens which can grab your credentials with a keylogger. It will also attempt to hold your files to ransom if yo… Continue reading MysteryBot: Do You Do Your Banking on Your Phone?→

Posted in Security Bloggers Network

There’s a New Type of DDoS Attack in Town

Posted on June 26, 2018 by Kim Crawley

Distributed Denial of Service (DDoS) attacks are a huge cybersecurity problem. And they’re only getting worse. According to a recent report by Neustar, 84% of the 1,010 organizations surveyed suffered at least one significant DDoS attack in the p… Continue reading There’s a New Type of DDoS Attack in Town→

Posted in Security Bloggers Network

Report: UK Security Has Much Room to Improve

Posted on June 4, 2018 by Kim Crawley

The UK government recently conducted an official survey of 1,519 British businesses and 569 British charities to determine how prepared British businesses are for cyberattacks. Here are some of the key findings.
The post Report: UK Security Has Much Ro… Continue reading Report: UK Security Has Much Room to Improve→

Posted in Security Bloggers Network

Stress Relief App Infects Facebook Users With Malware

Posted on May 30, 2018 by Kim Crawley

‘Relieve Stress Paint’ is a Windows Trojan with a UI and functionality very similar to Microsoft Paint. It spreads via Facebook messages or email, which markets it as a legitimate stress-relieving app. Top geographic targets include Vietnam… Continue reading Stress Relief App Infects Facebook Users With Malware→

Posted in Security Bloggers Network

Chrome to brand FTP as “not secure”

Posted on September 18, 2017 by Kim Crawley

With the release of Chrome 63 in December 2017 FTP will be branded “not secure” Continue reading Chrome to brand FTP as “not secure”→

Posted in FTP, Google, Google Chrome, Vulnerability, Web Browsers

Fears raised about accuracy of new forensic DNA techniques

Posted on September 13, 2017 by Kim Crawley

Lawyers are challenging convictions in which DNA analysis played a part, claiming that a new tool isn’t reliable Continue reading Fears raised about accuracy of new forensic DNA techniques→

Posted in crime, forensics, genetics, Law & order | Tagged DNA

What your phone can tell city transport planners

Posted on September 11, 2017 by Kim Crawley

London is just the latest city to use data gathered from mobile phones to try and understand how people use vital infrastructure Continue reading What your phone can tell city transport planners→

Posted in Barcelona, Data, data analysis, Internet of Things, IoT, London, Public Transport Victoria, Toronto, WiFi hotspot

Lenovo settles lawsuits with 32 states over Superfish

Posted on September 6, 2017 by Kim Crawley

Lenovo agrees to pay $3.5m for breaking users’ security by installing Superfish Continue reading Lenovo settles lawsuits with 32 states over Superfish→

Posted in adware, Lenovo, malware, privacy, proxy, SBN, spyware, Vulnerability, Web Security, Windows

Would-be cyberattackers caught by malware with a sting in the tail

Posted on September 5, 2017 by Kim Crawley

It’s hard to feel sorry for people who get stung by the very malware they’ve bought to sting others Continue reading Would-be cyberattackers caught by malware with a sting in the tail→

Posted in botnet, Botnets, Dark Market, dark web, malware, remote administration Trojan, Security threats, Trojan, trojans

Are you an adrenaline junkie who takes risks with security?

Posted on August 29, 2017 by Kim Crawley

How much of a link is there between risky online behavior and taking care with your security? A researcher has been trying to find out Continue reading Are you an adrenaline junkie who takes risks with security?→

Posted in employees, Phishing, psychology, research paper, Security Leadership, Security Research, Security threats | Tagged Addiction

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Anthropic’s Mythos Helped Build a Working macOS Exploit in Five Days May 16, 2026
  • The Search for the Next ‘James Bond’ Actor Has Begun May 16, 2026
  • Another detail emerges about Instructure’s agreement with ShinyHunters; Debate continues about whether to pay May 16, 2026
  • Salvaged VFDs in Nixie-Like Clock May 16, 2026
  • Fedora’s AI Developer Desktop Initiative Blocked by Community Backlash May 16, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up