May the Fourth For May the Fourth last year I found the original BBC Film ’77 review of Star Wars by Barry Norman – I thought it was worth revisiting for those of you that missed it: The post also links to some archive photos of the release from The Guardian.
AirTag stalking – could it be a thing of the past?
I have written about the privacy issues surrounding Apple AirTags and similar gadgets. They were originally made to enable careless people (like me) find our keys and other things that get misplaced. It did not take people long to realise they could also track people with them. This is a …
Continue reading “AirTag stalking – could it be a thing of the past?”
Backups vulnerable
Backups of all your important information and systems, resilient to attack, is an essential part of any incident response and business continuity plan. So anything that could impact that back-up must be a priority to solve. So if you use Veeam back-up you need a conversation: Hackers target vulnerable Veeam …
Exploited Vulnerabilities
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added TP-Link, Apache and Oracle vulnerabilities to the Known Exploited Vulnerabilities Catalog. CISA Adds Three Known Exploited Vulnerabilities to Catalog | CISA
Apple Rapid Security Response
Apple has used the Apple Rapid Security Response feature of iOS and macOS for the first time, since it was included with the operating systems seven months ago, to send a patch to the public. Apple uses iOS and macOS Rapid Security Response feature for the first time | Ars …
