There is an article on the Octagon Technology site discussing their cyber security tools package. Security Built-in – Octagon Technology
Triple AAA – the most important concept in information security
Authentication – Authorisation – Accountability For good security you must authenticate (A number one) who has access to your information. Then, once they have proven beyond a doubt who they are, that should authorise (the second A) them to access only that information they are entitled to and no more. …
Continue reading “Triple AAA – the most important concept in information security”
When Hacking is a Competition
Before we go on – hacking competitions are not illegal and many of them are organised across the world each year. They give a chance for the white hat hacking community to improve their skills and can often find flaws in software that benefit all of us. Once a cyber …
Microsoft Exchange server vulnerabilities
Microsoft Exchange server vulnerabilities On the 5th of January 2021 there was an exploit reported on the Microsoft Exchange server and on the 6th January 2021 the first breach was observed. But nobody really knew anything about it. “The attacker was detected by a group on the 5th of January …
Continue reading “Microsoft Exchange server vulnerabilities”
If you are under pressure you may make a mistake
A classic ploy for an email attack is to make the message so urgent that you do not think carefully before clicking on the link or opening the attachment. The article below illustrates this ploy – the email creates a story where the result of not taking action is the …
Continue reading “If you are under pressure you may make a mistake”
