89 Posts

Mark Samuels

Tech Journalist

Mark Samuels is an experienced business technology journalist with an outstanding track record in research. He specializes in the role of chief information officers (CIOs) and is adept at helping executives understand the business benefits of complex technologies. Key areas of interest include innovation, digital transformation, cloud computing, mobility, information security, ecommerce and big data. Mark has written articles for national newspapers, including The Guardian, The Times and The Sunday Times. He has also produced features and columns for a range of IT trade publications, such as Computer Weekly, ZDNet, Tech Republic, IT Pro, Channel Pro, CBR and The Register.

Written By Mark Samuels

Google Patches Critical Android Vulnerabilities

Google recently disclosed 138 Android vulnerabilities, including media framework issues that could enable attackers to execute arbitrary code remotely.

Change of Style in Phishing Attacks Creates Fresh Concerns for Big-Name Brands

Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.

Stack Clash Bug Could Compromise Linux and Unix Defenses

Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.

Hidden PHP Rootkits Unearthed, Putting Apache Modules at Risk

A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.

Attackers Leverage SambaCry Flaw to Run Cryptocurrency Miner

Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.

Database Leak Exposes Millions of Car VINs, Puts Customer Security at Risk

The personal information of 10 million U.S. car owners was exposed in a massive leak of car VINs, according to researchers at Kromtech Security.

New Vulnerability in Enterprise Apps Puts Data at Risk

Developers of many enterprise apps potentially expose sensitive data by failing to properly secure the connection between back-end servers and the app.

Cloak-and-Dagger Attack Creates Android Device Takeover Risk

Your Android device could be at risk from a new class of attack that allows for full takeover of a smartphone with valid permissions.

Personal Information Hack Leaves Children at Risk of Identify Theft

Researchers discovered thousands of pediatric medical records for sale online. This personal information is particularly valuable to identity thieves.

With Teddy Bear Bluetooth Hack, 11-Year-Old Proves IoT Security Is No Child’s Play

An 11-year-old boy used a clever Bluetooth hack to control his teddy bear and demonstrate that not even connected toys are immune to IoT security risks.