A gadget the size of a 10p coin, the AirTag was intended to help people find their keys. Instead it has facilitated a boom in terrifying behaviour from abusers Anna Moore – The Guardian 5 September 2022 AirTags – a great idea but a privacy nightmare. Worse than that, they …
If you are better informed on the how, what and where of ransomware attacks, you will be better equipped on what decisions you need to take to defend against it.
Here is an article from last week that is an in depth look at the Vice Society hacking gang’s operations. It was issued by the following US government agencies; the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center …
CISA adds twelve vulnerabilities to the Known Exploited Vulnerabilities Catalog
These include products from Google, D-Link, QNAP, Apple, MicroTik, Oracle, Fortinet, Netgear and Android, with D-Link getting the most mentions. CISA Adds Twelve Known Exploited Vulnerabilities to Catalog  | CISA
Connected technology reaches everywhere – it is the internet of things. But some of those things surely need special attention to their security?
Like medical devices: Four vulnerabilities discovered in popular infusion pumps, WiFi batteries – The Record by Recorded Future Your takeaway from this is to look at your IoT and connected devices (such as CCTV) and check they meet your cybersecurity standard, are patched and secured and if administered by a …
Advice if you must use USB portable storage
Sometimes the easiest and best storage for your workflow, is a portable USB memory stick and the one thing that gives us a headache when we are carrying out a cyber security survey is the use of portable USB memory sticks! Do you want too why? Then hop over to …
Continue reading “Advice if you must use USB portable storage”
