We had a hard time selecting the articles for this week’s security roundup, as there’s been a lot of interesting stuff going on.

My colleague, Andra, explained how and why you should do some spring cleaning on your PC and remove old software that makes your system vulnerable.

In my recent article, I made a case for a paranoid approach to online security and wrote about why you should protect your data like everyone’s watching (’cause maybe they really are!).

We also launched a new project in this past week, that we’ve been working a lot on and really hope you’ll enjoy. It’s called The Daily Security Tip and its purpose is to provide you an easy way to improve your cyber security. If you want to give it a try, all you have to do is sign up with your email address and we’ll send you a quick online safety tip, one each day, for a full year. P.S. It’s for free.

And now off to the weekly security roundup:


Security articles of the week



1. Crypto-ransomware spreads via infected ads delivered by major websites

There’s been a massive crypto-ransomware campaign delivered through malvertising on major websites. Among the victims there were: The New York Times, BBC, MSN, AOL, NewsWeek, The Weather Network,, etc.

The new campaign started last week when “Angler,” a toolkit that sells exploits for Adobe Flash, Microsoft Silverlight, and other widely used Internet software, started pushing laced banner ads through a compromised ad network.


2. 4 reasons why you shouldn’t pay in a ransomware attack

And just as many reasons why you should backup, backup, backup! Regularly do multiple backups of all your important data.


3. One of the attackers responsible for the Fappening pleaded guilty

Almost two years after the Fappening (alsko known as the Celebgate), the famous hacking scandal that involved nude photos of celebrities, one of the attackers responsible for it pleaded guilty.

The method used? Plain old phishing. He sent phishing emails that appeared as if they were sent by Apple and Google, asking the victims to provide their credentials. The attacker then used them to log into their accounts, where he found the nude photos.


4. iOS malware infects non-jailbroken smartphones

The most recent example of how even iOS devices can be infected with malware.


5. Tips from a hacker on how to protect your laptop and smartphone

This is one of the articles that we shared on our social accounts in this past week and received the most re-tweets and clicks. Kevin Mitnick gives advice on how to enhance your smartphone and laptop’s security.


6. The FCC wants to stop ISPs from selling your data to advertisers

The FCC (Federal Communication Commission) forwarded a proposal that regulates how much data about us are the ISPs allowed to sell. We salute the initiative, now let’s see how it works out.


7. Cybersecurity best practices to teach your employees

Forward it, save it, print it, stick it on the bathroom walls, do whatever it takes to make sure that everyone reads this and acts accordingly.


8. FBI Warns of Vehicle Hacking

The FBI warns the drivers to take the risk of cars and trucks hacking seriously.

“With this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats.”


9. The reality of IoT – Friend or Foe?

And since we brought into subject the connected things and how vulnerable they are at this moment, here’s an article on the good and bad sides of Internet of Things.


10. It’s Not About Privacy — Phone Protection Today is Personal Safety Tomorrow

Last but not least – an opinion article published on Medium, that explains how and in what directions things could escalate if we don’t fight for our phone protection and encryption.




We’re swimming in a sea of (apparently) terrifying security news. It’s hard to discern the real threats from the ones exaggerated by the media and exploited in order to increase their traffic. When it comes to privacy and security approach, where do you draw the line between convenience, precaution and paranoia?

Leave a Reply

Your email address will not be published. Required fields are marked *