Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Jerome Segura has blogged for Malwarebytes about a ransomware attack of sorts that poses a potential problem for OS X users. We’ve become all too familiar with malware that targets Windows users, telling them they have to pay the FBI or the police a fine for some infraction, often involving po ...
Posted 17 July 2013 by David Harley
0
comments
A (Very) Brief History of (Mac) Time…
I came across a brief article on Forbes by Andy Greenberg on a bug in the beta version of iOS 7 that makes it possible to bypass its lockscreen in order to access (not to mention delete, tweet etc.) the phone owner’s photographs. Well, it’s not the worst news ever to come out of Cupertin ...
Posted 15 June 2013 by David Harley
0
comments
Cruising the Misinformation Superhighway
  Long before there was a World Wide Web, when the internet was largely a playground for academics and the military, and most people still thought spam was a canned meat, there were already hoaxes and scams (pyramid schemes, Ponzi schemes, lures into premium rate phone services, fake friends a ...
Posted 28 February 2013 by David Harley
0
comments
Mac AV Testing: How Useful Is It?
  I commented recently (on an independent AV testing-related blog) on a blog article from Intego in which Lysa Myers commented not only on the infamous Imperva pseudo-test, but on a test report from Thomas' Tech Corner.   On January 28, Thomas Reed returned to the fray with a further ro ...
Posted 29 January 2013 by David Harley
0
comments
I just came across an interesting blog by Lysa Myers (for Intego) on jailbreaking: The Latest in Jailbreaking: Will Malware Follow? Ironically, while there are rumours of an imminent untethered jailbreak for iOS 6.0.2, the most recent high-profile jailbreak is for Windows RT, approximately equivale ...
Posted 09 January 2013 by David Harley
0
comments
Send in the Clones
  The longer you stay in this game, the more obsolete information you have cluttering up your memory cells. Technology moves quickly, and in the tug o’ war o’ attrition between malware and anti-malware, the effective lifetime of a specific malicious binary is often very short indee ...
Posted 17 December 2012 by David Harley
0
comments
  As the pseudonymous Old Mac Bloggit – my colleague at Mac Virus – has already noted, there’s some interesting Mac-related content included in the Sophos Security Threat Report 2012 (some of it already summarized in an Infosecurity article here: Malware set to take a big bit ...
Posted 07 December 2012 by David Harley
0
comments
OSX/Dockster Spyware
On November 30th, Intego blogged about OS X spyware it calls OSX/Dockster.A. This relatively simple backdoor trojan, found on Virus Total, provides a remote shell to give a remote attacker access to the system, provides a channel for downloading additional files, and has keylogger functionality. The ...
Posted 03 December 2012 by David Harley
0
comments
McAfee & Michelangelo
  Without breaking any confidences, it’s fair to say that the present troubles of John McAfee, founder of the AV company that still bears his name, has inspired a lot of comment in the security industry, a lot of it not particularly complimentary to him.   Despite having been conn ...
Posted 19 November 2012 by David Harley
1
comment
  In an IT Pro Portal article whose title says it all – Windows vs Apple OS X security: market share more important than product – Will Dalton gives Team Cymru's Steve Santorelli the chance to make the  point that operating system vendors aren't really in the bu ...
Posted 08 November 2012 by David Harley
0
comments
Apple Support and Anti-Social Engineering
When Infosecurity Magazine originally wrote about the attack on Mat Honan, the focus was on Apple’s culpability, though it’s become clearer since that there’ve been a multitude of security sins committed here that weren’t all Apple’s (notably Amazon and Honan himself). ...
Posted 08 August 2012 by David Harley
0
comments
Pickpockets in the (app) Marketplace
Suddenly, it seems, the App Store is having a (very small) taste of the sort of criticism previously reserved for Android outlets, recently with regard to ZonD80’s provision of a service by which Apple’s in-app purchasing mechanism can be subverted, hard on the heels of reports of a prob ...
Posted 20 July 2012 by David Harley
0
comments
Kelly Jackson Higgins has noted “4 Signs That Apple's Sharpening Its Security Game”. And indeed, there are indications that Apple’s hard-line “We don’t have any security problems” attitude as getting a bit smoother at the edges, as the Mac threatscape has started ...
Posted 02 July 2012 by David Harley
1
comment
Apple OS X and Risk Reduction
Some of the confidence Mac users have in the security of their chosen operating system derives from over-reliance on proactive patching. This outbreak highlights the need to be aware that patching of known vulnerabilities in system software or applications is not necessarily prompt enough to foresta ...
Posted 16 April 2012 by David Harley
0
comments
Flashbacks and Backtracks
If you follow my Mac Virus blog, you’ll have noticed that I’ve been tracking some of the coverage of Mac malware incidents to hit my radar in the last couple of weeks. In fact, hits on Mac Virus have been skyrocketing in the past 24 hours, so perhaps this a good time to recap on a couple ...
Posted 06 April 2012 by David Harley
1
comment
OS X Malware: A Steady Trickle
I’m guessing that the myth of OS X invulnerability to malware is pretty much busted by now: at any rate, there has been wave after wave of OS X-related malware reports in the past week or two. Sophos were the latest big name to weigh in on the OSX/Imuler malware that DrWeb, Intego, ESET and yo ...
Posted 26 March 2012 by David Harley
0
comments
OSX/Imuler: the Image-Conscious Trojan
Intego recently posted some information on its blog concerning the Imuler information-stealing Trojan. The variant that Intego calls OSX/Imuler.C uses a different stealth/social engineering technique to that used by previous variants. It seems to be intended to spread via .ZIP archives containing th ...
Posted 16 March 2012 by David Harley
0
comments
Malware: a Matter of Definition
Kurt Wismer has just put up a blog asking is the iphone really malware free? (Don’t be put off by the trademark absence of capitalization). Wismer is not illiterate and very far from stupid, asks some very pertinent questions, and his commentary is always worth reading. In fact, if keeping the ...
Posted 13 February 2012 by David Harley
0
comments
Carrier IQ: Not Just an Android Issue
Unless you’re currently trekking through the Gobi, you’ve probably caught some of the fuss about Carrier IQ, accused of conduct resembling a rootkit more than legitimate logging. I think that some of the indignation has been a little overdone, as I commented here, but there are certainly ...
Posted 01 December 2011 by David Harley
0
comments
iPaddling in Corporate Waters
Computer Weekly, in an article I mentioned in my previous blog here, notes that Tablet device ownership among mobile employees increased from 33% in the second quarter of 2011 to 44%.That statistic dovetails quite neatly with a study from ComScore on Digital Omnivores: How Tablets, Smartphones and C ...
Posted 18 November 2011 by David Harley
Showing 1 - 20 of 30 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×