Christopher Boyd
Lead Malware Intelligence Analyst

Former Director of Research at FaceTime Security Labs. He has a very particular set of skills. Skills that make him a nightmare for threats like you.

January 19, 2017 - Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. Unfortunately, things can still go wrong...

CONTINUE READING1 Comment

January 13, 2017 - Selfies! Everybody likes the odd selfie, but are you keeping good security practices in mind when setting up the shot? There are dangers both online and off. We take a look at the latest possible security issue stemming from a quick snap, along with some of the things you should (and shouldn't) be doing when lining up your latest photo.

CONTINUE READINGNo Comments

January 12, 2017 - Watch out: sponsored Tweets leading to phishing pages are doing the rounds once more. We take a look at the latest phishing scam being pushed to unsuspecting Twitter users, and show how the scammers are after a double-whammy of login credentials and credit card information.

CONTINUE READING1 Comment

December 13, 2016 - Memes are weird things, and weren't always about lolcats or frogs or whatever the latest terrible image macro doing the rounds happens to be. I quite like this line from Wikipedia on said subject: Proponents theorise that memes are a viral phenomenon that may evolve by natural selection...Memes that propagate less prolifically may become extinct, while others may survive, spread, and (for better or for worse) mutate. The plot of The Ring is pretty much the concept of a meme made deadly - pass on this cursed videotape within 7 days, or you die horribly. How far will you go to save yourself? Well, our old friend 2016 is here to ask that question one more time, because Ransomware authors have decided to tweak their victim's get out of jail method.

CONTINUE READING8 Comments

October 31, 2016 - There's been a bit of an issue with promoted Tweets on Twitter in the last few days - well, one specific promoted Tweet at any rate - in the form of a rogue phish asking for login credentials and payment information. We take a look at what the scammers have been up to, and how this scam could end up being quite successful for those involved...

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language