More stories

  • in

    Cybersecurity staff are struggling. Here's how to support them better

    Image: Nitat Termmee/Getty Cybersecurity professionals are at breaking point, with many fearing they will soon lose their jobs because of a cyberattack and others struggling to cope with the growing strain. Unless businesses act soon, an ever-growing skills gap might become an unbridgeable chasm.  Almost half (47%) of cybersecurity incident responders say they’ve experienced burnout or […] More

  • in

    How to install Kali Linux on Apple Silicon Macs

    You do this by clicking on Create a New Virtual Machine, and then select Virtualize. From the list of operating systems, choose Other, then click Browse… and find your Kali Linux installer that you downloaded earlier.Once selected, click Continue, and I bring the Memory slider to 2048MB. You can assign more, but I find 2GB to be more than enough.As for storage, I find that 32GB is more than ample for Kali Linux.Once you get to the Summary page, give the virtual machine a name, check the box next to Open VM Settings, and click Save. More

  • in

    Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered

    It’s $170 from the official store (if you can buy it new, but third-party sellers are pushing them for two or three times the price). For some, this is nothing. For others, this is a lot.As to whether it’s worth the money, it depends.For the money, it’s hard to buy anything else that can do what the Flipper Zero can do. If you want something to experiment with NFC and RFID and sub-GHz wireless networks, it’s a nice all-in-one tool. The GPIO outputs are also cool if you’re into playing with hardware.It also gives you the ability to run BadUSB attacks on devices.But where I see the main power of Flipper Zero is less the hacking destination, but more the journey.The Flipper Zero is a brilliant learning tool, and you will be learning all along the way.What can you learn? How GitHub works, how to download and install firmware, how to flash hardware, what all the different networking and wireless protocols are and how they work, and how to work with GPIO — for starters. More

  • in

    People are already trying to get ChatGPT to write malware

    Image: Getty/NurPhoto The ChatGPT AI chatbot has created plenty of excitement in the short time it has been available and now it seems it has been enlisted by some in attempts to help generate malicious code. ChatGPT is an AI-driven natural language processing tool which interacts with users in a human-like, conversational way. Among other […] More

  • in

    This Mac ransomware is old but it could still cause you big problems

    Image: Getty/GaudiLab Ransomware attacks aren’t just a threat to Windows operating systems — they’re encrypting files on macOS devices and demanding ransom payments for a decryption tool, too.  Cybersecurity researchers at Microsoft Security Threat Intelligence have detailed several ransomware campaigns targeting Apple-based computers and networks — and the methods of attack are very familiar to […] More

  • in

    Ransomware decryption tool: Victims of MegaCortex can now unlock their files for free

    Image: Getty Victims of MegaCortex ransomware attacks can now decrypt their files without giving into the ransom demands of cyber criminals, thanks to a free decryption tool that’s been released following collaboration between cybersecurity researchers and police.  The MegaCortex ransomware decryptor was built by cybersecurity analysts at Bitdefender in cooperation with Europol, the No More […] More