Are your passwords on this list?
They shouldn’t be but you never know: Top 200 Most Common Password List 2021 The infographic above will put you on the right track. My preference where possible is to go passwordless:
Cybersecurity Starts in the Boardroom
They shouldn’t be but you never know: Top 200 Most Common Password List 2021 The infographic above will put you on the right track. My preference where possible is to go passwordless:
Yesterday Apple had its September event where all the new toys were revealed, including iOS 16 – which will be on the new devices announced and available as an upgrade for iPhones going back to 2017. The new iOS and MacOS will both support passkey security rather than passwords. Apple …
Passwords are still an important part of everyone’s cybersecurity, whilst we wait for the passwordless society to come round. Here is a weekend read from Bleeping Computers looking at password strength: Cyber Awake | Train Your Team To Protect Against Cyber Attacks(opens in a new tab) The Benefits of Making …
Continue reading “Let’s talk about passwords again. Complex is king.”
The PennyWise malware is masquerading as crypto-coin mining software and being advertised in a variety of YouTube videos – showing that any communications method can be exploited for phishing attacks. PennyWise malware on YouTube targets cryptocurrency wallets and browsers | TechRepublic To help build confidence in the product, the threat …
Continue reading “Malware targets cryptocurrency wallets and browsers”
Apple will be releasing iOS 16 to the public this autumn, however the developer release was made at Apple’s World Wide Developers Conference 2022. Also announced were an array of forthcoming Apple hardware and software about to be released – what interests me here is that Apple, true to it’s …
I try and highlight the variety of social engineering phishing emails doing the rounds as awareness among your people about the ways they are having their trust exploited, when they check their email, is essential for them to beat the threat actors. Here is another one taken apart by the …
Continue reading “Make money fast – the classic social engineering phishing campaign”
Here is another example of a data breach at a council. Although breach implies someone broke in and stole the data – as opposed to what happened which was that the Council employees themselves just sent the sensitive information out as part of a Freedom of Information (FOI) request – …