Our team often get desperate calls from clients, who are expecting an urgent email which they know has been sent, but they have not received it. The support staff usually quickly check the anti-virus, advanced threat protection, the firewall or other barrier/filtering protection (depending on what the client has) to …
More malware lurking in the Google Play Store
You need to keep any credentials you have secret, they are you method of authentication so you can prove beyond a doubt who you are to your bank, Microsoft 365, to Amazon etc. (Have a look at this post on CyberAwake to see how authentication fits into your cyber security …
Continue reading “More malware lurking in the Google Play Store”
Update on the 49ers ransomware attack
I covered this story when it broke back in February and it had a connection to me as I have a San Francisco 49ers account. It contained no financial details but I immediately changed my credentials. I do not reuse passwords, so that was a non-issue for me. Now the …
US Cybersecurity and Infrastructure Security Agency security advisories for Apple and Mozilla
CISA is a good source of information on updates and vulnerabilities. They do issue industrial updates as well, I do not cover them here as I think they are outside the scope of these posts, but if you are involved in industry the site is worth a regular visit to …
Windows 11 automation tools open to abuse
Automating tasks on a computer used to be hard, but today it is very easy with a range of drag and drop tools available. Obviously the Power Automate included into Microsoft’s Windows 11 will be among the most popular – I know I use it. Now researchers at Zenity have …
Continue reading “Windows 11 automation tools open to abuse”
