There has been a flurry of WordPress security and vulnerability articles over the past week or so. It is no surprise that the world’s most popular website builder is a target for threat actors, especially as Automatic’s core code can be added to with third-party, open-source or even self-written plugins, …
Tor browser can now give privacy and evade censorship barriers
I am a great fan of the Tor browser – I use it when carrying out research and when added to a VPN, it gives me a high level of privacy – particularly useful when travelling or working away from the office. Now the latest release includes functionality to assist …
Continue reading “Tor browser can now give privacy and evade censorship barriers”
Android Malware installed on over 3,ooo,ooo devices
The malware is called Autolycos and it has been found in at least eight apps on the Google Play Store by Evina’s security researcher Maxime Ingrao. Have you installed it? New Android malware on Google Play installed 3 million times (bleepingcomputer.com)
A few of the ransomware stories in the media at the moment – to give you some idea of the scale of the cyber security risk you have to plan for. Do you need training?
I have gathered here just a selection of the ransomware stories that have made the headlines – for these there are many more that go unreported in the media or even outside the organisation. ‘Lives are at stake’: hacking of US hospitals highlights deadly risk of ransomware | Hacking | …
I have told everyone to use MFA so I do not need to think about more cyber security! UPDATED 14 July 2022
This post was original published on 27 June 2022 Update 14 July 2022 Here is an article from the Microsoft Threat Intelligence Center (MSTIC) and the Microsoft 365 Defender Research Team outlining how the big phishing campaigns backed by experienced and skilled hackers can bypass the security of multi-factor authentication: …