It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …
If you use WordPress then read on…
Automattic likes to tell us that it’s product WordPress is the world’s most popular website platform so it is dissapoibnting that a vulnerability has existed in it’s own popular plugin Jetpack since 2016. Jetpack fixes critical information disclosure flaw existing since 2016 (bleepingcomputer.com) How popular is Jetpack? As it offers …
A Real-World Example – BYOD A Primer (pt.3)
I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …
Continue reading “A Real-World Example – BYOD A Primer (pt.3)”
AI and Malware
In August the support team at Octagon Technology edited the company’s newsletter – whilst Diana and I were away. They chose a theme of artificial intelligence (AI) – here are the articles they wrote: Careful with that A.I. Eugene ! / How NOT to A.I. / Stop feeding the machine. …
Because It’s Friday – Old Space and Ada Lovelace
Following on from last week’s “Because It’s Friday” time travel article, this week I have a story looking at the past, way back in the past. Nearly as far back as we can look… The earliest galaxies formed amazingly fast after the Big Bang. Do they break the universe or …
Continue reading “Because It’s Friday – Old Space and Ada Lovelace”