Setting up phony websites with just a letter different from the legitimate sites is nothing new – I can remember a marketing company (now defunct) trying to persuade me to buy dozens of variations of our IT support company domain, to capture those potential customers who have “fat fingers” – …
Quishing!
Here is an interesting article from the National Cyber Security Centre about whether you should trust public QR codes. Now we have had experience with this. One of our clients found that someone had stuck a new QR code over the one they displayed in their window. When I investigated, …
“View Document”
Sometimes a cyber-attack is something as easy as adding a button saying “view document” when whale phishing senior people in an organisation. Ongoing Microsoft Azure account hijacking campaign targets executives (bleepingcomputer.com) Your takeaway When was the last time you audited the credentials and associated authorisations of those credentials? If you …
AI and your Cyber Security
This article by Oli Buckley, Professor of Cyber Security at the University of East Anglia and Jason Nurse, Associate Professor in Cyber Security at the University of Kent takes a balanced look at how AI is starting to help threat actors create more believable attacks. Cybercriminals are creating their own …
Because It’s Friday – Mixing Valentine’s Day and Viruses!
Like an aging film star the computer virus has a number of birthdays – here is one of them: Computer viruses are celebrating their 40th birthday (well, 54th, really) – SANS Internet Storm Center This article also includes the fact that the computer virus is dead! Although you still need …
Continue reading “Because It’s Friday – Mixing Valentine’s Day and Viruses!”