For a small business or home office, it seems very easy today to set up your own “view from anywhere” CCTV system, but we often find the security is not correctly configured. Add to that that the manufacturer’s security can be faulty… Over 80,000 exploitable Hikvision cameras exposed online – …
Credential thefts and Amazon’s AWS cloud
Threat actors have to host their malicious login stealing pages somewhere – why not in Amazon’s cloud: Hiding a phishing attack behind the AWS cloud
FBI Credential Stuffing warning
The reuse of password by users is still probably the most common cyber security mistake organisations and individuals make – making a credential stuffing attacks profitable for threat actors. Once a threat actor has gathered their lists of credentials then they – or rather their automated tools will attempt to …
I do not use the Apple iOS VPN and here’s why… Written whilst on holiday using a VPN.
When I use a VPN, I do it because I want my communications across the internet to be private. Apple iOS VPN is not private enough: Two years on, Apple iOS VPNs still leak IP addresses • The Register I always use a VPN when I suspect the internet connection …
Smartphone security
I think if you read this blog, you have a smartphone and that the security of that smartphone is important to you. By now you should also understand that the functionality of that smartphone is a trade off between your privacy with the various suppliers. I do not use some …
