Plug-ins is a way of vendors and third-parties extending the functionality of software – it work very well, the success of WordPress is partly based on plug-ins. Now the threat actor vendors are taking the same approach with their malware – with the plug-ins helping to obfuscate the malware to …
Brute force attacks on Window 11
Disabling risky services for any OS or software “out-of-the-box” is always a good idea. If you need it, then you or your system administrators can enable it. A brute force attack is where a threat actor – or normally a threat actor computer – will try a range of different …
The obvious question is “Why only New Zealand”
If it is harmful content in New Zealand then surely most of the rest of the world would consider it harmful. And if it can be done in New Zealand – why not the rest of the world – the Big Tech have enough money: Social media companies promise to …
Continue reading “The obvious question is “Why only New Zealand””
Email scams – how hard is it to spot them?
This was going to be a “weekend read” but I thought it was important enough to be part of the main news feed. For an email phishing scam to work it has to, in some way, make you trust it. This exploitation of your trust is called social engineering and …
Continue reading “Email scams – how hard is it to spot them?”
National Cyber Security Centre Threat Report 22 July 2022
Threat Report 22nd July 2022 – NCSC.GOV.UK
