This infographic sets out the similarities and differences between privacy and security, and illustrates some of the issues around making data available whilst maintaining all the protections. Again another balancing act you need to understand.
Bypass your cybersecurity scanners
We all depend heavily on anti-virus scanners, they are a primary tool on our local machines and servers to combat the simplest of cyber attacks – sending us malware via email. Consequently any techniques developed by bad actors to get malicious packages through those scanner is a major concern. There …
Tesco defends against an attack
Tesco reports that services are back to normal after some disruption over the weekend. However as with any cybersecurity incident, action continues to be taken to check if any other systems are compromised – but I have changed my Tesco password, Tesco website and app back up after hack attempt …
National Cyber Security Centre Threat Report
Here is a link to the NCSC weekly threat report for week ending 22/10/2021: Weekly Threat Report – NCSC.GOV.UK
Telecoms vulnerabilities
Here is more on the story – Sophisticated hackers attack telecom companies – Smart Thinking Solutions with links to more information. Nation-State Attacker of Telecommunications Networks – Schneier on Security