Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …
iOS and macOS cough up your passwords…
Researchers have created a lightweight, practical method of forcing Apple’s flagship operating systems to give up any passwords stored in them. Hackers can force iOS and macOS browsers to divulge passwords and much more | Ars Technica The attack called iLeakage is only an experiment and an academic paper at …
Researchers just cannot leave things alone!
No sooner do I write an article telling you all about the cyber security benefits of using a VPN when you have doubts about an internet connection, than a team of academics come along with a paper showing that a VPN can be compromised. My article: It’s holiday time again …
Continue reading “Researchers just cannot leave things alone!”
I just love this cyber security story…
This is all just academic research (at the moment) but here is a story about exploiting the range of voice assistants, Siri, Google Assistant, Alexa and Cortana, using voice commands, issued from one device, that are inaudible to the human owners, but can activate another device. To do what? Here …
Extortion Ransomware
I have a couple of articles over on CyberAwake looking at the issue of extortion ransomware and offering some tips for small and medium organisations on how to protect their information using tools they already have. From Encryption Ransomware To Extortion Ransomware Part I From Encryption Ransomware to Extortion Ransomware …