Last week I wrote about the paperwork associated with a well-run BYOD project and policy. Although I spoke about paperwork in reality – except for that copy on the office shelf – the paperwork is probably just a collection of M365 and PDF files, saved in the cloud. However, sometimes …
Is Bluetooth broken?
Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …
iOS and macOS cough up your passwords…
Researchers have created a lightweight, practical method of forcing Apple’s flagship operating systems to give up any passwords stored in them. Hackers can force iOS and macOS browsers to divulge passwords and much more | Ars Technica The attack called iLeakage is only an experiment and an academic paper at …
Researchers just cannot leave things alone!
No sooner do I write an article telling you all about the cyber security benefits of using a VPN when you have doubts about an internet connection, than a team of academics come along with a paper showing that a VPN can be compromised. My article: It’s holiday time again …
Continue reading “Researchers just cannot leave things alone!”
I just love this cyber security story…
This is all just academic research (at the moment) but here is a story about exploiting the range of voice assistants, Siri, Google Assistant, Alexa and Cortana, using voice commands, issued from one device, that are inaudible to the human owners, but can activate another device. To do what? Here …