Articles

  • 2 weeks ago | solcyber.com | Paul Ducklin |Charles P. Ho

    Fast Flux considered harmfulThe news wires have been full of stories about a cyberthreat dubbed Fast Flux, a jargon term invented in the first decade of this century, when the technique was both new and unusual. The term has largely dropped out of common use in recent years, but now it’s back, with the same frisson of danger that it had when it was new.

  • 4 weeks ago | solcyber.com | Paul Ducklin |Charles P. Ho |Hwei Oh

    Updates in brief Apple’s latest round of updates are out, covering almost all supported products and operating system versions, including: macOS 13, 14 and 15 (respectively known as Ventura, Sonoma, and Sequoia) iPadOS 15, 16, 17 and 18 iOS 15, 16 and 18 The good news, in contrast to the recent emergency updates for macOS 15 and iOS 18 that came out three weeks ago, is that none of the listed bugs are tagged as zero-days, the name given to security holes that are found and exploited by...

  • 2 months ago | solcyber.com | Paul Ducklin |Charles P. Ho |Hwei Oh

    Encryption at restEncryption has been an important part of our digital lives for many years now. All Apple iPhones, for instance, and most Android devices, are shipped with what’s known in the trade as FDE, short for full-disk encryption, already activated. The idea is simple and useful: anything, or more precisely almost anything, that you write to your device gets automatically encrypted on the way from the operating system to storage, and decrypted when it’s read back in.

  • Jan 22, 2025 | solcyber.com | Paul Ducklin |Hwei Oh |Charles P. Ho

    What’s in a name? The digital cyber-vandals who churned out the first computer viruses liked to tag them with counter-cultural names that they could use for bragging rights. Sometimes, those names took hold because they were memorable, or because they were unavoidably woven into the visual fabric of the malware.

  • Dec 3, 2024 | solcyber.com | Paul Ducklin |Charles P. Ho |Hwei Oh

    Every account mattersIn a recent article with the headline “Gone in 24 hours,” we wrote about how and why a single day is more that enough time for cybercriminals to set up and pull off an attack, even if it involves buying a fake online domain, setting up a bogus website at that domain, and spamming out thousands or even millions of users to lure them in.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →