Why threat actors will stick with phishing attacks rather than moving onto move hi-tech attacks?

I really liked this article. I have covered various highly involved cyber attacks over the last few months, deepfakes, hacking cars, air–gap attacks but as it describes in this article, you can use technology to steal those credentials or you can just ask nicely for them: Phishing works so well …

Malware in redistributed James Webb Space telescope images – but we use JWST images here at Smart Thinking!

Here is a story that shows you always have to keep your guard up when dealing with cyber-security, as the threat landscape is constantly changing and the threat actors will always choose vectors that are in the news. This particular attack comes right back here to Smart Thinking – malware …

Because It’s Friday – last minute shopping for Father’s Day… and of course the sentient Google AI story

It is Father’s Day this Sunday, and just in case you still have to buy your Dad a present, I have some ideas over on Octagon Technology that might help you out: Of course if you are well organised, you bought a gift, card and booked the restaurant or food …