After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
Not CrowdStrike – Kombat Hamsters
Not all the news this week is going to be about a global company messing up their updates! Threat actors are always looking for the quickest and easiest way to reach the greatest number of victims – that is how their “business model” works! So exploiting a game with 250 …
Google Pixel Updates
Google has released fifty patches for its Pixel range of Android based phones – some of which fix vulnerabilities that are being actively exploited. Google warns of actively exploited Pixel firmware zero-day (bleepingcomputer.com) As with any cyber security patch, if you have Google Pixel phones handling your organisation’s information, either …
Android devices and cyber security
I have just started an IT and Cyber Security Audit for a client and we have barely started when the issue of mobile phone use has come up – because there are more cyber security risks with Android devices when compared to iOS devices. Over 90 malicious Android apps with …