Ransomware Attack Hobbles Prestigious University College London

University officials said users likely kicked off a ransomware attack that infected a dozen personal and shared drives by visiting a compromised website. Continue reading Ransomware Attack Hobbles Prestigious University College London

Security For Small Business – Paul’s Security Weekly #516

Don Pezet from ITPro.TV joins us on the show to help us identify security challenges and solutions for small business/mid-market. Backups are key, as are ease of use and support. The most important thing? Awareness and education! Tune in for the full d… Continue reading Security For Small Business – Paul’s Security Weekly #516

The Future of Ransomware

Ransomware isn’t new, but it’s increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It’s extortion taken to its networked extreme. The criminals provide step-by-step instructions on how to pay, sometimes even offering a help line for victims unsure how to buy bitcoin. The price… Continue reading The Future of Ransomware

WannaCry Ransomware

Criminals go where the money is, and cybercriminals are no exception. And right now, the money is in ransomware. It’s a simple scam. Encrypt the victim’s hard drive, then extract a fee to decrypt it. The scammers can’t charge too much, because they want the victim to pay rather than give up on the data. But they can charge individuals… Continue reading WannaCry Ransomware

Hackers Threaten to Erase Apple Customer Data

Turkish hackers are threatening to erase millions of iCloud user accounts unless Apple pays a ransom. This is a weird story, and I’m skeptical of some of the details. Presumably Apple has decided that it’s smarter to spend the money on secure backups and other security measures than to pay the ransom. But we’ll see how this unfolds…. Continue reading Hackers Threaten to Erase Apple Customer Data

Apple’s Cloud Key Vault

Ever since Ian Krstić, Apple’s Head of Security Engineering and Architecture, presented the company’s key backup technology at Black Hat 2016, people have been pointing to it as evidence that the company can create a secure backdoor for law enforcement. It’s not. Matthew Green and Steve Bellovin have both explained why not. And the same group of us that wrote… Continue reading Apple’s Cloud Key Vault

Comparing Messaging Apps

Michah Lee has a nice comparison among Signal, WhatsApp, and Allo. In this article, I’m going to compare WhatsApp, Signal, and Allo from a privacy perspective. While all three apps use the same secure-messaging protocol, they differ on exactly what information is encrypted, what metadata is collected, and what, precisely, is stored in the cloud ­- and therefore available, in… Continue reading Comparing Messaging Apps