Shane Huntley, Senior Director Threat Analysis Group, has written an article about the Ukraine Russia conflict and how the increased cyber activity has spilled out and impacted the cyber security landscape. Fog of war: how the Ukraine conflict transformed the cyber threat landscape (blog.google) Not so light reading for the …
Do you remember when Macs did not get viruses?
Well I was not sure it was true then and it is not true today – especially if you are tempted to save money and use pirated software: Pirated Final Cut Pro infects your Mac with cryptomining malware – BleepingComputer Your takeaway from this is:
Unintentional data leak
Although this article looks at the image cropping security issue from the position of a whistle-blower, it could just as easily apply to a document you send out to a client or supplier or use internally. For example and image of pay scales across a company where you crop out …
Because It’s Friday – A follow-up to the Mary Queen of Scots cyber security story
This is an interesting follow on to the story we included in “Because It’s Friday” a couple of weeks back where a cipher created by Mary Queen of Scots was decrypted having been a secret since the 16th century. Rupert Goodwins fits Mary’s life and political activities into modern day …
Continue reading “Because It’s Friday – A follow-up to the Mary Queen of Scots cyber security story”
CISA advises three exploited vulnerabilities
Although a US government agency the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalog is a valuable resource for anyone responsible for cyber security. It reports on mainstream and less used software so that offbeat package you use could be reported on one day! They have released an …
Continue reading “CISA advises three exploited vulnerabilities”
