We do everything online – well that may be an over simplification – but last time I went to vote, I must admit I thought I could be doing this from my phone. But if we are going to vote online, we need very special precautions and checks to make …
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
These apply to the Zimbra Collaboration software: CISA Adds Two Known Exploited Vulnerabilities to Catalog  | CISA
Phishing attacks are meant to deceive everyone…
Even someone like me and Dan Goodwin, who wrote the linked article – people who work in cybersecurity all the time. I’m a security reporter and got fooled by a blatant phish | Ars Technica It is worth reading to see what you are dealing with, when it comes to …
Continue reading “Phishing attacks are meant to deceive everyone…”
Facebook and Instagram tracking
Felix Krause, a privacy consultant and one time Google engineer has an article examining how Meta tracks users when they follow links from Meta websites using the iOS apps: iOS Privacy: Instagram and Facebook can track anything you do on any website in their in-app browser · Felix Krause (krausefx.com) …
Because It’s Friday – Writing code is difficult…
Be More Like Dave – Dilbert Comic Strip on 2022-08-07 | Dilbert by Scott Adams …so you or your cyber security consultant should check any code (web app or software) you have written for you. How secure is open source software? Do you use open source software or have software …
Continue reading “Because It’s Friday – Writing code is difficult…”
