Here are a couple of the current examples of Android malware that could compromise your organisation, reported in the technical press this week. New SandStrike spyware infects Android devices via malicious VPN app (bleepingcomputer.com) Malicious Android apps with 1M+ installs found on Google Play (bleepingcomputer.com) They have different malicious intent …
Catching up with US Cybersecurity and Infrastructure Security Agency latest advisories
Whilst I have been away CISA has continued issuing useful advice. It added a Google Chromium vulnerability to the Known Exploited Vulnerabilities Catalog. Google Chromium is an open–source browser project and is behind many widely used browsers including Google Chrome and Microsoft Edge. CISA Has Added One Known Exploited Vulnerability …
What do you know about going passwordless? Find out here why you should do it.
Passwordlessness now extends to PayPal… …at least if you have an iPhone. PayPal ditches passwords, at least on Apple devices • The Register Ditching passwords is the best step in preventing the recycling of passwords by users and the subsequent credential stuffing attacks by threat actors. Find out in this …
Continue reading “What do you know about going passwordless? Find out here why you should do it.”
Who are the targets for phishing campaigns?
The threat actors will go after anyone who they can exploit, steal credentials from, or who has something the criminal wants! In this case it is workers for the forthcoming US elections. This one is targetting people in a privileged position: US election workers hit with phishing, malware emails • …
Continue reading “Who are the targets for phishing campaigns?”
The Insider Threat and $250,000
What happens when the relationship between you and a trusted employee breaks down either through ill will or just the fact that they are leaving and taking your client database with them? This is the insider threat. In the case of a “high-profile financial company in Hawaii”, a former employee who …