The zero-day threat is a serious one for any vendor or organisation to deal with and you should understand how it can defeat your technical defences. Here is a three-part mini-series that takes you through the zero-day threat in a straightforward way so you can make some decisions on how …
Apple and End-to-End Encryption
Apple has joined the debate about the UK government’s proposed bill to weaken every UK citizen’s privacy online, by threatening to pull affected Apple services from the UK market. As Apple (and several articles I have posted) state, laws already exist for the authorities to breach the privacy of citizens …
Apple devices are not immune
I often write about the cyber security risk of Android apps – this is not an app issue but a iMessage phishing (smishing!) attack. USPS Phishing Scam Targeting iOS Users – SANS Internet Storm Center If the message was opened on a Mac, the anti-phishing protection redirects to the legitimate …
Not the Scottish University I went to for my Cyber Degree!
The University of the West of Scotland (UWS) reported a “cyber incident” earlier this month. Now the Rhysida ransomware gang is demanding at least 20 bitcoin (about £450,000) in an auction for the confidential university data they say they have stolen. Scottish university allegedly targeted in ransomware attack – BBC …
Continue reading “Not the Scottish University I went to for my Cyber Degree!”
How does the malware get in?
I am often asked this question by clients and particularly prospective clients, who think they do not need our cyber security awareness training or any of the tools in our security stack. The answer to the question is not easy, in a Word or OneNote file, through a link to …
