In any cyber attack where the criminals want to make money, there is usually a server somewhere out there on the internet, being used for command and control of the malware. Now there this is being offered as a service the threat actors can purchase, to save them the full …
Do you know what data you are sharing when you use your car
This is an interesting article about your privacy, if you have a connected car, by Jon Keegan and Alfred Ng over on the The Markup website. Who Is Collecting Data from Your Car? – The Markup I have a modern car and read this with interest. The section “Anonymization and Aggregation” …
Continue reading “Do you know what data you are sharing when you use your car”
NHS cyber-attack effectively contained
News of these issues with the National Health Service (NHS) broke yesterday, but I decided to wait for the speculation to die down before reporting on something as important as an essential service we all rely on. The cyber incident impacted the NHS 111 service – not the emergency 999 …
Cybercrime report from HP Wolf Security
This is an interesting report from HP’s cyber security division: The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back | HP Wolf Security Something to read over coffee. HP-Wolf-Security-Evolution-of-Cybercrime-Report.pdf
We have clients with impacted devices – so our team has been out checking and patching
We practice what we preach: DrayTek routers offer great value and functionality to many micro to medium businesses, so a flaw with them could be an issue to an organisation without IT or cybersecurity support: Critical RCE vulnerability impacts 29 models of DrayTek routers (bleepingcomputer.com)
