Security Advisory

Malware of the 90s: Remembering the Michelangelo and Melissa viruses
Google’s data charts path to avoiding malware on Android
Emotet launches major new spam campaign
The cyber insurance question
New Chrome version aims to remove all ads from abusive sites
Supply-chain attack on cryptocurrency exchange
Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm
Antimalware Day: The evolution of malicious code
Growing pains: Skills gap meets expanding threat surface
Five ways to make Halloween less cyber-scary for kids
Ransomware and the enterprise: A new white paper
Nothing exceeds like excess; or, a lack of privacy in the digital age
IoT: A roomful of conundrums
Cathay Pacific breach exposes data of 9.4 million passengers
ESET releases new decryptor for Syrian victims of GandCrab ransomware
Banking Trojans continue to surface on Google Play
LuminosityLink RAT author sentenced to 2.5 years in jail
Strict password policy could prevent credential reuse, paper suggests
Scams and flaws: Why we get duped
Tumblr patches bug that could have exposed user data
VestaCP compromised in a new supply-chain attack
GreyEnergy: Updated arsenal of one of the most dangerous threat actors
Phishers are after something unusual in ploy targeting book publishers
Facebook downgrades victim count, details data accessed in breach
The Occasional Orator Part 3
Tips for minding the digital skills gap
New TeleBots backdoor: First evidence linking Industroyer to NotPetya
Send in the clones: Facebook cloning revisited
California outlaws poor default passwords in connected devices
Google+ to shut down due to lack of adoption and privacy bug
Blockchain: What is it, how it works and how it is being used in the market
Most routers full of firmware flaws that leave users at risk
Virus Bulletin 2018: Supply chain hacking grows up
Make it a cyber-habit: Five simple steps to staying safe online
Why ask the public about cybercrime and cybersecurity?
Virus Bulletin 2018: Attack velocity ramps up
Facebook: No evidence attackers used stolen access tokens on third-party sites
IT forensic tools: How to find the right one for each incident
Why keeping your cyber-wits about you matters
50 million Facebook users affected in breach
Top tips for protecting your Smart TV
Who’s behind DDoS attacks at UK universities?
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
Twitter patches bug that may have spilled users’ private messages
Defending your company from cyberattack
How to improve hiring practices in cybersecurity
The Occasional Orator Part 2
Attackers crack Newegg’s defenses, slurp customers’ credit card data
Mirai’s architects avoid prison thanks to work for FBI
Fake finance apps on Google Play target users from around the world