New users and monetization methods are increasingly profitable for gaming industry, but many companies find they have to stem growth in cheats, hacks, and other fraud to keep customers...
Read moreLatest episode - security expert John Shier explains what the real-life cybercrime stories in the Sophos Threat Report can teach us
Read moreHow Development Teams Should Respond to Text4Shell
November 24 2022Yet another *4Shell exploit highlights the horror of strange visitors into enterprise environments. This Tech Tip focuses on what to do next.
Read moreWhy Africa’s Telecoms Must Actively Collaborate to Combat Fraud
November 24 2022Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
Read moreFive tips to keep yourself, and your friends and family, out of the clutches of "chopping block" scammers...
Read moreFive tips to keep yourself, and your friends and family, out of the clutches of "chopping block" scammers...
Read more‘Patch Lag’ Leaves Millions of Android Devices Vulnerable
November 24 2022Months after a fix was issued by a vendor, downstream Android device manufacturers still haven't patched, highlighting a troubling trend.
Read moreThe infostealer Aurora’s low detection rates and newcomer status are helping it fly under the radar, as more cybercriminal gangs target cryptocurrency wallets and communications apps.
Read moreChinese threat actors have already used the vulnerable and pervasive Boa server to infiltrate the electrical grid in India, in spate of malicious incidents.
Read moreThe US Has a Shortage of Bomb-Sniffing Dogs
November 24 2022Nothing beats a dog’s nose for detecting explosives. Unfortunately, there aren’t enough dogs:
Last month, the US Government Accountability Office (GAO) released a nearly 100-page report about working...
Read more

Recent Comments