Media Database
>
Bill Brenner

Bill Brenner

Cybersecurity Writer / Author at Naked Security

Contact this person
Email address
b*****@*******.comGet email address
Influence score
59
Location
United States
Languages
  • English
Covering topics
  • Computers & Technology
  • Security

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

spinalcolumnonline.com

Walled Lake teacher, coach claims he was fired for tweets supporting Trump

A 28-year-old Walled Lake Consolidated School District teacher and coach has claimed he was fired for tweeting his support of Trump. Multiple news source
searchsecurity.techtarget.com

Libpurple flaw: How does it affect connected IM clients?

A flaw in the library providing core functionality for several IM clients enables code execution attacks. Find out more on the libpurple flaw.
searchsecurity.techtarget.com

Analyzing the capabilities of Symantec DeepSight Intelligence

Read about Symantec DeepSight Intelligence and its ability to provide actionable, contextual data about today’s IT threats to organizations.
nakedsecurity.sophos.com

News in brief: Experian PIN fail; SEC hacked; AI vs terror

Your daily round-up of some of the other stories in the news
nakedsecurity.sophos.com

How BitPaymer ransomware covers its tracks

This BitPaymer malware variant uses tricks that you don’t usually see in ransomware – but it still scrambles your files in the end.
nakedsecurity.sophos.com

Beware the Kedi RAT pretending to be a Citrix file that Gmails home

The Kedi Remote Access Trojan has some sneaky tricks up its sleeve – don’t get caught out by it
nakedsecurity.sophos.com

How shared Android libraries could be weaponized for data theft

When you’re installing an Android app, pause before you approve one that asks for a lot of permissions – do you really need that app on your device?
nakedsecurity.sophos.com

Emotet’s goal: drop Dridex malware on as many endpoints as possible

Emotet arrives as a malicious email attachment and tries to steal your online banking credentials
nakedsecurity.sophos.com

Android users: beware ‘Invisible Man’ malware disguised as Flash

Once installed it tries to steal banking and credit card details
nakedsecurity.sophos.com

Philadelphia RaaS: our map of how it works (and how to prevent it)

At $400, the Philadelphia ransomware kit isn’t cheap – but crooks buying it will get a lot of bang for their buck, as we’ve discovered from digging in to how it works
news.sophos.com

Sophos at Black Hat USA 2017 and BSidesLV

We’ll be at Black Hat USA and BSidesLV with talks and a shirt giveaway – come and say hi; we’d love to see you
nakedsecurity.sophos.com

How app developers are gaming Google Play to boost their rankings

Our researchers spotted some app developers who were gaming the Google Play store – here’s what they uncovered in their investigation
nakedsecurity.sophos.com

Deconstructing Petya: how it spreads and how to fight back

It’s been 24 hours since the outbreak first hit: here’s what we know now about how Petya behaves
news.sophos.com

Petya variants behind global ransomware outbreak

What we know so far about the Petya ransomware outbreak
news.sophos.com

Ransomware families – and how to fight them

SophosLabs looked at the most prolific ransomware variants. And, we offer you the tools to better defend against them.
nakedsecurity.sophos.com

The Google Play adware apps that just won’t die

You can ‘force stop’ but the ads will just keep popping back up again
nakedsecurity.sophos.com

Infection by mouseover – what you need to know about PowerPoint spam

Malware-laced PowerPoint files are nothing new – but several recent spam campaigns have added a new twist.
news.sophos.com

We’re taking a quantum leap over traditional machine learning

Many security vendors already use machine learning. So, what makes our deep learning approach different and how much better does it perform?
nakedsecurity.sophos.com

Wolf in sheep’s clothing: a SophosLabs investigation into deliverin...

SophosLabs gets under the skin of the bad guys’ latest attempt to drop ransomware on to your PCs
nakedsecurity.sophos.com

Why you should avoid Star Hop and Candy Link in Google Play

Both games look harmless enough, but they contain a payload that ensures you’ll be hammered with spam
news.sophos.com

GDPR’s Right to Explanation: the pros and the cons

Under the General Data Protection Regulation’s Right to Explanation a user can ask for an explanation about an algorithmic decision made about them – but with it comes positives and neg…