Category Archives for Malware

I’m An Airline, Fly Me

This an email from a bona fide airline:  Dear Sir/Madam, Please be informed that your transaction with [international carrier] has been confirmed. Due to fraud prevention procedure against Credit Card transaction, we would like to validate your recent transaction with … Continue reading

13. September 2016 by jeremy
Categories: Malware, Privacy, scam, Security | Tags: , , , | Leave a comment

The Bangladesh Bank Hack, Part XIV

Lots of attention at the moment on the implications of the Bangladesh Bank hack, now four months old. This is a piece I contributed last week. Quite a bit of water has gone under the bridge since then. We not … Continue reading

27. May 2016 by jeremy
Categories: Malware, Scams | Tags: , , , , | Comments Off on The Bangladesh Bank Hack, Part XIV

Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar | Reuters

My piece on what Deep Panda looks like in action: Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar | Reuters: Security researchers have many names for the hacking group that is one of the suspects for the cyberattack on … Continue reading

22. June 2015 by jeremy
Categories: datawars, Malware, Phishing | Tags: , , , , , , , | Comments Off on Hunt for Deep Panda intensifies in trenches of U.S.-China cyberwar | Reuters

Spy in the Sky – are planes hacker-proof?

My take on aviation cybersecurity for Reuters: Plane safe? Hacker case points to deeper cyber issues: “Plane safe? Hacker case points to deeper cyber issues BY JEREMY WAGSTAFF Security researcher Chris Roberts made headlines last month when he was hauled off … Continue reading

27. May 2015 by jeremy
Categories: datawars, Malware, Reuters, Security | Tags: , , | Comments Off on Spy in the Sky – are planes hacker-proof?

BBC: Beyond the Breach

The script of my Reuters story on cybersecurity. Podcast available here (mp3) If you’re getting tired of internet security companies using images of padlocks, moats, drawbridges and barbed wire in their ads, then chances are you won’t have to put … Continue reading

27. February 2015 by jeremy
Categories: BBC, Malware, Security | Comments Off on BBC: Beyond the Breach

Reuters: Beyond the Breach

My piece on disruption in the cybersecurity space. Too many companies and ideas to mention in Reuter-space, but it’s a start.  Thanks to Ian Geohegan, as ever, for his editing touch.   Beyond the breach: cyberattacks force a defense strategy … Continue reading

09. February 2015 by jeremy
Categories: Malware, Phishing, Reuters, Security | Tags: , | Comments Off on Reuters: Beyond the Breach

Scammers Scam Gmail Scam Filters

This amused me. A scam message got through Gmail’s eagle-eyed scam filters telling me to update my account details. That’s not unusual. But was it because the scammers added their own assurance that they had already done the filtering? It … Continue reading

14. November 2011 by jeremy
Categories: Malware, Scams | Tags: , , , | Comments Off on Scammers Scam Gmail Scam Filters

Southeast Asia’s Viral Infection

Southeast Asia is fast developing a reputation as the most dangerous place on the Internet. It’s not a reputation the region can afford to have. By one count Thailand has risen to be the country with the most number of … Continue reading

30. August 2011 by jeremy
Categories: datawars, Malware, Security | Tags: , , , , , , , , , , , , , , , , , , , , , | Comments Off on Southeast Asia’s Viral Infection

Stuck on Stuxnet

By Jeremy Wagstaff (this is my weekly Loose Wire Service column for newspaper syndication) We’ve reached one of those moments that I like: When we’ll look back at the time before and wonder how we were so naive about everything. … Continue reading

04. October 2010 by jeremy
Categories: Malware, Privacy, Scams, Security | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Stuck on Stuxnet

The Trojan That Never Was

How not to handle a PR debacle, Part 767: Avast, the free antivirus I’ve been using, and recommending, for while, has lost my confidence by a double whammy: mis-identifying pretty much every executable on my computer as a Trojan, and … Continue reading

03. December 2009 by jeremy
Categories: Malware, PR | Tags: , , , , , , , , | 4 comments

← Older posts