Google Threat Assessment Group tackles smartphone malware

This is a follow-up to last week’s story: New commercial spyware for phones – Smart Thinking Solutions This is Google describing how they countered the Hermit smartphone malware and discusses their Project Zero for countering zero-day threats. Spyware vendor targets users in Italy and Kazakhstan (blog.google) Your best defence against …

Privacy assured by UK judge as ruling states law enforcement must use due process

In many of my posts about privacy and governments and organisations that want to reduce encryption, do away with VPN privacy or just make things easy for law enforcement at the expense of the law abiding citizen’s privacy, I refer to law enforcement using due process. UK judges agree with …

More crypto-currency stolen!

Big numbers – lots of money – so a prime target for threat actors: Thieves pilfer $100m-plus in cryptocurrency from Harmony.one • The Register It is not the blockchain that is compromised – it is the handling processes that are vulnerable.

How does ransomware get into my system? I’m careful!

Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …