Articles by John Hawes
An annual survey on computer security issues run by a UK university was published last week. Its stats on the prevalence of ransomware, and how many people give in to the crooks and pay the ransom, raised some eyebrows.
Kristy Ross, employee at rogue anti-virus pushers Innovative Marketing Inc., dragged her appeal against her whopping $163 million fine through the courts for years - and has lost. Do you think the fine fits the crime?
Three former Purdue University students are thought to have altered their grades by breaking into staff offices and attaching keyloggers to computers operated by class professors, possibly by replacing the keyboards with doctored versions.
US Attorney General Eric Holder has used his weekly video message to demanded Congress get busy developing a "strong national standard" for breach notifications in the wake of the Target and Neiman Markus leaks.
Cybercrime is all about the money. And, in the end, that money leads back to the financial sector. Banks, credit unions, insurers and everyone charged with looking after our money and covering us when something bad happens are starting to feel the pinch from the steady growth in cybercriminality.
If it felt like the last year saw more and bigger data breaches than usual, well, that's because it did.
When we look at some of the biggest security headlines of the past year - Target data breach, Cryptolocker ransomware, Snowden/NSA leaks - there's one big lesson we can all be taught: secure everywhere.
A group of teenagers at the Corona del Mar High School in Orange County, California, used a hardware keylogger to snoop on their teachers' login and password details. Why are school networks so vulnerable, and how can you prevent keylogging?
The Syrian Electronic Army has been at it again, with eBay and PayPal its latest victims. The compromise appears to have allowed doctoring of some local webpages, and no personal or financial data is thought to have been breached.
Panin, a Russian national, admitted to developing and distributing the banking malware, which was sold to over 150 clients through underground cybercrime forums, and is designed to compromise PCs and connect them to botnets of similarly backdoored systems.
Several US judicial system websites were offline for a spell on Friday, prompting immediate worries of some kind of organised cyber assault aimed at bringing the nation's legal system to its knees.
Microsoft has admitted that spearphishers compromised email accounts at the company, potentially leaking documents "associated with law enforcement inquiries". Just the day before Microsoft revealed the legal data loss, the SEA made another strike, this time targeting news outlet CNN.
It's that time of year again. A new "Worst Password" list has been published for the password-savvy population's enjoyment. As much as we like to chuckle/groan at this list, is there ever a justification for a bad password?
Shouldn't we be thinking further ahead, developing new protocols, processes and technologies that don't stick a hasty patch over the latest problem, but push us towards a world where whole categories of problems are no longer a risk?
The control centre of a nuclear power plant really doesn't sound like the sort of place you'd want to see a malware infection, but don't fret - this was no Stuxnet.
A study released last week claims that as many as 1.28 million schoolchildren in the UK may have had their fingerprints taken by their school authorities last year, with over 30% of those schools not getting permission from parents first.