It is the oldest and easiest bit of email social engineering – promise you something that is too good to be true. Your tempted and the hackers have got you. You think this would have gone the way of “princes offering to share millions with you, if you will just …
NCSC warns of risks with App stores
This is a warning that we not only access App stores from our phones, but smart TVs, smart speakers, voice assistants, games consoles, computers and other devices all have app stores we use. Application Stores – NCSC.GOV.UK If there are any weaknesses in these various app stores, then you can …
Anatomy of a RAT attack using a password protected Excel attachment
This is the classic way a hacker gets their payload into your business – send you a spreadsheet that needs your immediate attention. Include the password in the email, this makes it more likely for you to open the file – make it look official and your cyber security threat …
Continue reading “Anatomy of a RAT attack using a password protected Excel attachment”
Privacy gets a boost in Connecticut
With California, Colorado, Utah and Virginia, Connecticut is the fifth US State to introduce laws protecting user’s privacy. Connecticut becomes fifth state with data privacy law – The Record by Recorded Future
Do you know what “business email compromise” is? Better still do you know how to combat this cyber security attack?
Research from the FBI shows how costly this type of cyber attack is to businesses: FBI: Business Email Compromise attacks led to more than $43 billion in losses since 2016 – The Record by Recorded Future At Smart Thinking and Octagon, we have had to investigate and deal with several …
