This is a story about the commercial spyware Pegasus and it’s possible misuses. EU commissioner calls for urgent action against Pegasus spyware | Surveillance | The Guardian
iPhone vulnerability alert – take action now
Get this done now! – iPhone Vulnerability – Octagon Technology I have posted an article on the Octagon Technology blog outlining how and why you should update your iOS NOW. Here is more information via Bruce Schneier: Zero-Click iMessage Exploit – Schneier on Security
The blockchain is polluting the planet – YouTube lecture on changing the world with smart contracts
There is an article on the BBC technology news site discussing the e-waste resulting from the mining of bitcoins: Bitcoin mining producing tonnes of waste – BBC News At the heart of this e-waste generation is blockchain technology – a very secure method of holding information across a distributed system. …
Designing a contact tracing app
This is an excellent academic article by Susan Landau on the privacy, efficacy, and equity of contract-tracing on smartphone apps. She raises some important points about the social and economic divide when it comes to technology, something that other developers and technologists should consider when creating their apps. Digital exposure …
You have to wonder why companies make these types of decisions…
In a world where every business has to have heard of cyber-security and should always be thinking about how to protect their information and their client and customer privacy it is incredible to hear of a company that felt they could keep PII on a single smartphone. It was then …
Continue reading “You have to wonder why companies make these types of decisions…”
The SolarWinds breach – a write up
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom – Lawfare (lawfareblog.com) This is a considered and well researched article by Professor in Law Bobby Chesney, looking at the how and why of the much publicised and far reaching SolarWinds security breach and subsequent attacks on their …
Email rules
The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …