Such is the sophistication of the bad actors on the web that it is easy to get caught out and let people steal your credentials. Have you seen those games on Facebook, where for example you are asked to give the name of your first pet and the road you …
Apple Updates again
It is often said, by myself and other computer and security professionals that you need to update your hardware and software with the latest patches when they are addressing security vulnerabilities. However The Register is reporting that the update can brick some Apple computers: Apple’s macOS Monterey update breaks some …
Hiding the threat in plain sight
Attackers are always looking for new way to get their illicit packages through defences and this research paper outlines how by exploiting Unicode, malicious code can be written into software so that human code reviewers cannot recognise that it is there. Trojan Source: Invisible Vulnerabilities “This work has been under …
National Cyber Security Centre Threat Report
Here is a link to the NCSC weekly threat report for week ending 29/10/2021: Weekly Threat Report – NCSC.GOV.UK
Hands up if this surprises you?
The politicians thought that they were safeguarding us (the citizens they were charged with protecting) when they debated and then voted in the GDPR amendments to the Data Protection Act. As citizens we have the right to believe that those MPs who lack a technical education got advice from a …
