That headline sounds like very good news for the rest of us. Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords – BleepingComputer Although it is not all good news – the threat actors that developed the fake hacking tool, which installs the Lumma stealer information-stealing malware. on the threat …
Information Security in the Office (pt.1)
With the summer nearly over, I thought I would kick-off the new season of cyber security articles with a look at some of the simple ways you can improve the cyber and information security in your office and help to prevent information leaking out of your organisation. Some of the …
Continue reading “Information Security in the Office (pt.1)”
The cyber security risk of end-of-life products.
I have come across the issue of EoL products being used several times whilst carrying out IT and Cyber Security Audits. Often the client has no idea that the firewall or internet connected printer they are relying on is no longer supported by the manufacturer. I have written about this …
Continue reading “The cyber security risk of end-of-life products.”
Mobile phone thefts
I have discussed your organisation’s information on an employee’s mobile phone as part of my Devices and Cyber Security Primer – and a BYOD policy is something, I find most organisations have. However, I have also found it is also one of the most ignored policies. This is why it …
Cloud Computing Cyber Security
Here is an excellent article from The Conversation, by Amro Al-Said Ahmad, looking at the vulnerabilities of cloud computing and infrastructure. How we’re using ‘chaos engineering’ to make cloud computing less vulnerable to cyber attacks (theconversation.com) Your Takeaway Many times, when I am involved with an IT and Cyber Security …