Skip to content
CHECK AVAILABILITY

GRAHAM CLULEY

Cybersecurity keynote speaker

Graham Cluley
Speaking  ⦁  Writing  ⦁  Podcast  ⦁  Contact  ⦁  About   
CHECK AVAILABILITY
CHECK AVAILABILITY
Speaking · Writing · Podcast · Contact · About  
⁠This week's sponsor: Browse privately with a secure VPN that safeguards your privacy. Unblock content worldwide. Get 64% Off Proton VPN.
ⓘ

Category: Malware

New CryptXXX ransomware variant made authors $50K in two weeks
June 29, 2016

New CryptXXX ransomware variant made authors $50K in two weeks

Malware on Google Play steals Viber photos and videos
June 28, 2016

Malware on Google Play steals Viber photos and videos

Bart ransomware takes files hostage by hiding them in password-protected ZIP files
June 28, 2016

Bart ransomware takes files hostage by hiding them in password-protected ZIP files

Anime site redirects to Neutrino exploit kit, CryptXXX ransomware
June 27, 2016

Anime site redirects to Neutrino exploit kit, CryptXXX ransomware

How malware could steal data from an air-gapped PC – via its fan

bitdefender.com

June 24, 2016

How malware could steal data from an air-gapped PC – via its fan

Godless mobile malware can root 90% of Android devices
June 24, 2016

Godless mobile malware can root 90% of Android devices

Security holes found in widely-used file compression library, leaving other products dangerously exposed

tripwire.com

June 23, 2016

Security holes found in widely-used file compression library, leaving other products dangerously exposed

Fraudsters impersonate victims’ ISPs in new tech support scam
June 23, 2016

Fraudsters impersonate victims’ ISPs in new tech support scam

Android malware uses Google Talk to call Chinese numbers
June 21, 2016

Android malware uses Google Talk to call Chinese numbers

Evil Santa Ded Cryptor ransomware places victims on the ‘naughty’ list
June 20, 2016

Evil Santa Ded Cryptor ransomware places victims on the ‘naughty’ list

Where’s the macro? Malware authors are now using OLE embedding to deliver malicious files
June 16, 2016

Where’s the macro? Malware authors are now using OLE embedding to deliver malicious files

North Korea stole F-15 blueprints and 42,000 defense-related documents from South Korea
June 14, 2016

North Korea stole F-15 blueprints and 42,000 defense-related documents from South Korea

⇤←…1020…919293…100110…→⇥

                   

Hire Graham Cluley to speak at your event | Contact | About

Privacy | Terms & Conditions

Powered by WordPress, securely hosted by WPX.
Copyright © 2001-2026 Cluley Associates Limited. All Rights Reserved.