We looked at some of the most common types of email phishing attacks in the last part of this Back-to-Basics mini-series and I had promised you today an article on “size matters”, but I have changed my mind. Every day I read up on the latest threats and developments in …
Email Phishing Attacks
I have published part 4 of my Back-to-Basics mini-series looking at how phishing attacks work and how they impact organisations every day, over on CyberAwake. Phishing Primer – Phishing Types (pt. 4) Here are parts 1 to 3: Phishing Primer – Social Engineering (pt. 1) Phishing Primer – Social Engineering …
When a feature becomes a cyber security liability
Microsoft’s VBScript has been over taken by both new technology and threat actors – it is time for it to go. Microsoft to start killing off VBScript in second half of 2024 – BleepingComputer I have written about the cyber security consequences of such built in functionality and what happens …
Continue reading “When a feature becomes a cyber security liability”
Password 1234
I did not bother with World Password Day – it used to be a useful thing, but as far as I am concerned when it comes to business cyber security every day is World Password Day – passwords are so important to understand and get right – have a look …
The Phishing Email and AI (pt. 3)
I have used the first two parts of this mini-series on Phishing attacks to look at the more general subject of social engineering because phishing is an application of social engineering aimed at you and your organisation. Start to understand the “how” of social engineering and you start to build …