Writing code for today’s sophisticated software is hard and no matter how careful the vendors are, how many beta and alpha testers they have, errors will always slip through. If those errors compromise the user’s security, you can bet a threat actor will discover them and exploit them. It is …
You cannot see a zero-point font…
The old trick of using a zero-point font in a document to conceal information you do not want to be readily detected by the reader, is being exploited again in a new way. This time it is being used to show Outlook emails as having been safely scanned when in …
Realistic Cyber Security – “Out of the mouths of AI”
I am very keen on the work of Bruce Schneier and his stuff pops up here on Smart Thinking from time to time – including this article by Diana: And this quote that I often use when writing about patches and updates: I was interested when on his blog, Bruce …
Continue reading “Realistic Cyber Security – “Out of the mouths of AI””
Cyber Criminals will attack and exploit anything and anyone!
I often refer to threat actors and hackers here on Smart Thinking and in other cyber security article I write for other outlets, however these are useful terms but in reality I am writing about cyber criminals. These cyber criminals operate indiscriminately in a globally connected environment and they have …
Continue reading “Cyber Criminals will attack and exploit anything and anyone!”
This really is a Nigerian email scam…
I often refer to the typical “Nigerian Prince” email scam in my Cyber Awareness Training – not expecting them to work today. But there are always new angles! Nigerian man pleads guilty to attempted $6 million BEC email heist – BleepingComputer Next week’s Wednesday’s bit is going to be about …
