Here are a couple of short articles from the Google blog that describes the different ways the company actively combats the threat actors to improve everyone’s online safety: Meet the hackers keeping you safe online (blog.google) Continuous innovation to keep you safe online (blog.google)
NHS August ransomware attack – data was stolen as well
Advanced, the NHS supplier at the centre of the August cyber-attack, were quick to go to press with their success of containing and limiting the reach of the ransomware attack. However now, after a considered investigation, whilst confining the attack, the threat actors exfiltrated data from the systems: It was …
Continue reading “NHS August ransomware attack – data was stolen as well”
That old chestnut again – yours and my privacy
Let me say this before I start, I support any action both legal and technical that will be effective in preventing the exploitation of the vulnerable. We support this government initiative (check the page footer): Let’s stop abuse together I like parts of the government’s forthcoming Online Safety Bill and …
Continue reading “That old chestnut again – yours and my privacy”
Because It’s Friday… Data, Data, Data and do you know what a computer data punch card is?
Whilst researching for yesterday’s installment of the Insider Threat series, that I am writing over on our online training site CyberAwake, I read an article by Bret Arsenault, from Microsoft that opened with this quote: The amount of data captured, copied, and consumed is expected to grow to more than …
Hacking made easy…
Once it required a level of technical skill, practice and hardware resources to carry out successful cyber attack that would make (illicit) money. Now researchers have discovered and easy to use framework that enables any would be hacker to craft sophisticated attacks, deploy them, steal information and monetise them: New …
