This is an article looking at the invisible threat in our hardware – UEFI rootkit attacks. Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us | Ars Technica
If a software attack will not work – get out the wire cutters
This is not something that most of us will have to defend against – but it reads like a classic 1960’s spy story. The Unsolved Mystery Attack on Internet Cables in Paris | WIRED UK Do you want another cyber security story that reads like a 1960’s spy story – …
Continue reading “If a software attack will not work – get out the wire cutters”
Because It’s Friday – how old are deepfakes?
There is plenty of news around about deep fakes – we have all seen the fake videos of various politicians and celebrities saying things they never would. But when was the first deep fake carried out: xkcd: Deepfakes Here is a deepfake from the past that made the news: Piltdown …
Continue reading “Because It’s Friday – how old are deepfakes?”
How secure is open source software? Do you use open source software or have software written for you? If so read on… UPDATED
When we undertake any cyber security survey, and we ask about software, we know the greatest amount of work we will have to do, is when the client says “we had this written for us” or we use this “open source software”. (We will not get into Android apps or …
1000 posts and counting
This is the 1000th news feed post here at Smart Thinking, so I was told by Marketing I needed to do something special. I would have simply gone on reporting the stories of the day and giving out advice, making sure you are all provided with a range of cyber …