Bruce Schneier has an interesting article today about impersonation. In this case it is bad actors abusing havard.edu email addresses. Using Fake Student Accounts to Shill Brands – Schneier on Security Impersonation is a real threat to any business, that does not have clear policies and procedures, and clear lines …
Apple Updates again
It is often said, by myself and other computer and security professionals that you need to update your hardware and software with the latest patches when they are addressing security vulnerabilities. However The Register is reporting that the update can brick some Apple computers: Apple’s macOS Monterey update breaks some …
Hiding the threat in plain sight
Attackers are always looking for new way to get their illicit packages through defences and this research paper outlines how by exploiting Unicode, malicious code can be written into software so that human code reviewers cannot recognise that it is there. Trojan Source: Invisible Vulnerabilities “This work has been under …
National Cyber Security Centre Threat Report
Here is a link to the NCSC weekly threat report for week ending 29/10/2021: Weekly Threat Report – NCSC.GOV.UK
Hallowe’en and maybe the hacker god will return from the dead! – #BeCyberSmart
In 2017 an academic paper1 about printer security highlighted open ports on many different types of printer. The paper was published on Monday 30 January and the following weekend a hacker using the pseudonym Stackoverflowin searched the internet to find vulnerable printers. The hacker then made his way into over …
Continue reading “Hallowe’en and maybe the hacker god will return from the dead! – #BeCyberSmart”