I have heard that excuse many, many times – including just last week when a client could not get access to his account! But what happens when the typo has cyber security implications? What happens when the typo has national security implications? Typo sends millions of US military emails to …
Phishing this is how the malware gets in!
I’ll start this story with an example of a phishing attack run by one of the Russian sponsored hacking groups currently involved in the Russian Ukraine conflict. You are not likely to be one of their carefully selected targets but it illustrates how other threat actors operate. The group is …
Continue reading “Phishing this is how the malware gets in!”
Good news for Android malware
Let’s end this week on a good news Android story. There is no doubt that malware infected and malicious Android apps do get distributed through the Google Play store – see last Friday’s final post among the many on this site. Google has taken various steps to try and deal …
Cyber Security Advisories
The US government Cybersecurity and Infrastructure Security Agency (CISA) has issued notices for updates for the products. Cisco Releases Security Update for SD-WAN vManage API | CISA Juniper Releases Multiple Security Updates for Juno OS | CISA You probably do not use these, but do you or someone in your …
Infected USB Drives
It is a very old attack, infect a USB stick and leave it somewhere. Who ever finds it may (will) plug it into a computer to see what is on it. It is human nature. If leaving the infected drive in Starbucks seems to random – then post them out …
