My article on one of the methods used by threat actors to erode our faith in multi-factor authentication (MFA) was published over on CyberAwake yesterday: More on MFA and your risks when using it – CyberAwake
Data Sovereignty – who can access what and where. UPDATED
The original post was published on 3 November 2022. Update 16 November 2022 This story has developed further with FBI Director Christopher A. Wray describing to the US Congress how China could exploit Tik Tok: FBI Director warns of potential Chinese gov’t exploitation of TikTok – The Record by Recorded …
Continue reading “Data Sovereignty – who can access what and where. UPDATED”
Deception for profit on a massive scale
Bill Toulas over on Bleeping Computer refers to the organisation Fangxiao as a malicious for-profit group. Fangxiao runs a massive of over 42,000 web domains that impersonate popular brands that redirect users to sites carrying adware apps, dating sites and that favourite of those browsing the web “free” giveaways. This …
CISA adds a Microsoft vulnerability to the Known Exploited Vulnerabilities Catalog
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a Microsoft Windows flaw to the Known Exploited Vulnerabilities Catalog. CISA Has Added One Known Exploited Vulnerability to Catalog    | CISA
YOU WILL NOT PAY THAT RANSOMWARE DEMAND!
Australia has been in the cyber security headlines recently with a couple of high-profile hacks that has seriously impacted millions of citizens: Now it is being reported that the Australian government is considering bringing in legislation to prevent organisations legally paying ransomware demands, in an attempt to disrupt the threat …
