Dan Kaplan

Send feedback to Dan Kaplan



Recent articles for Dan Kaplan

Ransomware snares victims with NSA PRISM ruse 
Aug 27, 2013 | Comment Now 
Kovter crooks likely behind attack.
 
LulzSec hacker Sabu's sentencing delayed 
Aug 26, 2013 | Comment Now 
Snitching hacker accused of 'facilitating hacking'.
 
Microsoft: Upgrade from Windows XP or risk 'infinite zero-days' 
 
Fake Flash Player extensions foists spam  
 
Microsoft removes Exchange 2013 patch after users report problems 
 
New Browlock ransomware emerges 
Aug 15, 2013 | Comment Now 
Runs out of Russia.
 
Microsoft pulls ASLR DEP bypass patch 
Aug 15, 2013 | Comment Now 
Fix caused Exchange 2013 glitch.
 
Tibetan malware attacks resurface 
Aug 14, 2013 | Comment Now 
Attackers forge watering hole.
 
Tools, code to control Ford and Toyota test cars released 
Aug 6, 2013 | Comment Now 
Researchers encourage others to hack cars.
 
FireEye to go public 
Aug 6, 2013 | Comment Now 
Plans initial public offering to raise $175 million.
 
Black Hat: Barnaby Jack's life and legacy remembered 
Aug 5, 2013 | Comment Now 
Tributes flow at Black Hat.
 
US Gov't can't help you with intelligence 
Aug 5, 2013 | Comment Now 
Govt classifies too much data.
 
NSA chief defends surveillance programs at Black Hat 
Aug 1, 2013 | Comment Now 
Privacy advocate Marlinspike calls warm audience reception 'disgusting'.
 
Vale security researcher Barnaby Jack 
Jul 29, 2013 | Comment Now 
Medical device hacker remembered.
 
LulzSec Hammond sentencing delayed two months 
Jul 29, 2013 | Comment Now 
Sentencing delayed until 15 November.
 
Man falls for ransomware attack, gets busted for child porn 
Jul 26, 2013 | Comment Now 
The law of unintended consequences strikes.
 
Researchers 'physically' hijack cars 
Jul 25, 2013 | Comment Now 
Controller area networks and automobile firmware used in Defcon research.
 
Fear of prosecution hampers security research 
Jul 22, 2013 | Comment Now 
The biggest loser may be the public.
 
FBI ransomware hits Mac 
Jul 17, 2013 | Comment Now 
Targets Safari.
 
Microsoft to boot vulnerable apps from stores 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1394

Vote