Here is cyber security advice for your organisation and home. There is a marked increase of threat actors using bank scams, online, via phone calls, text messages and email. But we should have already been aware of these. The new trends are for attacks to come via social media, online …
The Anatomy of a Malicious Word Document
If you want to know what a malicious phishing email and Word document looks like and how it functions, have a read of this article by Xavier Mertens on SANS Internet Strom. Infostealer Embedded in a Word Document – SANS Internet Storm Center It uses a simple technique to get …
WordPress plugin vulnerability
A vulnerable WordPress plugin is in the news. The Advanced Custom Fields plugin needs to be updated or your site is vulnerable: WordPress plugin flaw puts ‘millions of websites’ at risk • The Register If you use this get it updated now. Do you know if your website uses this …
Passwordless Google Accounts
I’m in. I have written about passwordlessness (I probably made that word up!) before. Eliminating the password makes it much harder for threat actors to compromise your security, exploit stolen credentials and gain unauthorised access to systems such as Microsoft and now Google: Google adds passkeys support for passwordless sign-in …
When is secure not secure
A while back Diana wrote a piece about the padlock in the URL bar of your browser and what it says about that sites security and means for your cyber security: Is that website secure? However what that symbol means in effect is that the communications between your device and …
