Yesterday I published my latest article over on our online training site CyberAwake looking at the most basic of cyber-attacks – an infected phishing email. Don’t be tempted to open that zip file A story of a phishing email – CyberAwake Could you people deal with this situation? QBot Malware: …
M.P.s warned about the risk of being spied on
The House of Commons Speaker, Sir Lindsay Hoyle has written to all M.P.s making them aware that the information they have on their mobile phones would be valuable to a “hostile state” and that they should take appropriate steps to protect that information. Hostile states are targeting you, Speaker warns …
Continue reading “M.P.s warned about the risk of being spied on”
I cannot say I am surprised by this – it is just a rush for profit…
…and the customers are likely to be the ones paying for the corporate mistakes and shortcuts. One of our team has just been away on holiday and had to leave their new shiny electric SUV at home because of “charging stress” between their home and the holiday cottage 300 miles …
Continue reading “I cannot say I am surprised by this – it is just a rush for profit…”
The supply chain is complicated – which is why it is vulnerable to exploitation
Bruse Schneier has an interesting article out today, describing how a Russian company that produces code that is included in thousands of smartphone apps, both iOS and Android, masquerades as an US company. Russian Software Company Pretending to Be American – Schneier on Security There is no suggestion of wrong …
Continue reading “The supply chain is complicated – which is why it is vulnerable to exploitation”
Cyber Attacks on Multi-factor authentication
My article on one of the methods used by threat actors to erode our faith in multi-factor authentication (MFA) was published over on CyberAwake yesterday: More on MFA and your risks when using it – CyberAwake
