Writing code for today’s sophisticated software is hard and no matter how careful the vendors are, how many beta and alpha testers they have, errors will always slip through. If those errors compromise the user’s security, you can bet a threat actor will discover them and exploit them. It is …
You cannot see a zero-point font…
The old trick of using a zero-point font in a document to conceal information you do not want to be readily detected by the reader, is being exploited again in a new way. This time it is being used to show Outlook emails as having been safely scanned when in …
Cyber Criminals will attack and exploit anything and anyone!
I often refer to threat actors and hackers here on Smart Thinking and in other cyber security article I write for other outlets, however these are useful terms but in reality I am writing about cyber criminals. These cyber criminals operate indiscriminately in a globally connected environment and they have …
Continue reading “Cyber Criminals will attack and exploit anything and anyone!”
This really is a Nigerian email scam…
I often refer to the typical “Nigerian Prince” email scam in my Cyber Awareness Training – not expecting them to work today. But there are always new angles! Nigerian man pleads guilty to attempted $6 million BEC email heist – BleepingComputer Next week’s Wednesday’s bit is going to be about …
It was not us!
This week I have been discussing user and systems monitoring with a client’s senior management team. Their immediate response was that they did not want to spy on their staff as they trusted them – and to be fair they are appear to be a friendly supportive organisation. However my …