More stories

  • in

    Hackers are using this old trick to dodge security protections

    Image: Getty/Manuel Breva Colmeiro Cyber criminals are exploiting an old vulnerability in Intel drivers in an attempt to gain access to networks in a way that allows them to bypass cybersecurity protections.  The attacks have been detailed by cybersecurity researchers at Crowdstrike, who suggest the campaign targeting Windows systems is the work of a cyber-criminal […] More

  • in

    Save 20% on a Tile Mate tracker

    Tile As someone who found herself embroiled in the FAA outage this morning, when I rebooked my flight, my luggage didn’t track information, so it didn’t show up on my new flight confirmation. However, I wasn’t too worried about knowing where my bags were thanks to the Tile Mate tracker I tucked in my suitcase. […] More

  • in

    How to install Google One VPN on MacOS

    Getty Images I’m a big advocate of using VPNs, especially when on the go and connected to networks you aren’t confident you can trust. When you use a VPN, all the data that leaves your machine is encrypted and anonymized.  More how-tos Adding a VPN is especially important when you’re transmitting sensitive data and don’t […] More

  • in

    'Cyber incident' halts Royal Mail's international export services

    Getty Images / Christine Phillips Royal Mail says it can’t send letters or parcels overseas because of disruption due to what it describes as a “cyber incident”.  “We are temporarily unable to despatch items to overseas destinations. Some customers may experience delay or disruption to items already shipped for export,” the company said in a […] More

  • in

    Cybersecurity staff are struggling. Here's how to support them better

    Image: Nitat Termmee/Getty Cybersecurity professionals are at breaking point, with many fearing they will soon lose their jobs because of a cyberattack and others struggling to cope with the growing strain. Unless businesses act soon, an ever-growing skills gap might become an unbridgeable chasm.  Almost half (47%) of cybersecurity incident responders say they’ve experienced burnout or […] More

  • in

    How to install Kali Linux on Apple Silicon Macs

    You do this by clicking on Create a New Virtual Machine, and then select Virtualize. From the list of operating systems, choose Other, then click Browse… and find your Kali Linux installer that you downloaded earlier.Once selected, click Continue, and I bring the Memory slider to 2048MB. You can assign more, but I find 2GB to be more than enough.As for storage, I find that 32GB is more than ample for Kali Linux.Once you get to the Summary page, give the virtual machine a name, check the box next to Open VM Settings, and click Save. More

  • in

    Flipper Zero: 'Can you really hack Wi-Fi networks?' and other questions answered

    It’s $170 from the official store (if you can buy it new, but third-party sellers are pushing them for two or three times the price). For some, this is nothing. For others, this is a lot.As to whether it’s worth the money, it depends.For the money, it’s hard to buy anything else that can do what the Flipper Zero can do. If you want something to experiment with NFC and RFID and sub-GHz wireless networks, it’s a nice all-in-one tool. The GPIO outputs are also cool if you’re into playing with hardware.It also gives you the ability to run BadUSB attacks on devices.But where I see the main power of Flipper Zero is less the hacking destination, but more the journey.The Flipper Zero is a brilliant learning tool, and you will be learning all along the way.What can you learn? How GitHub works, how to download and install firmware, how to flash hardware, what all the different networking and wireless protocols are and how they work, and how to work with GPIO — for starters. More