The British Army has had material posted in it’s YouTube and Twitter accounts by unauthorised persons. For a time they lost control of the Twitter account, where the account name and profile image was changed. Information was posted to the Army’s official channels about cryptocurrencies, using images of Elon Musk, …
Google Threat Assessment Group tackles smartphone malware
This is a follow-up to last week’s story: New commercial spyware for phones – Smart Thinking Solutions This is Google describing how they countered the Hermit smartphone malware and discusses their Project Zero for countering zero-day threats. Spyware vendor targets users in Italy and Kazakhstan (blog.google) Your best defence against …
Continue reading “Google Threat Assessment Group tackles smartphone malware”
How does ransomware get into my system? I’m careful!
Of course the threat actors use social engineering techniques and phishing emails: Fake copyright infringement emails install LockBit ransomware (bleepingcomputer.com) Ransomware is probably the biggest cyber security threat facing businesses today. Coming soon: Five essential skills you need to do your own cybersecurity – A Masterclass Are you facing cyber …
Continue reading “How does ransomware get into my system? I’m careful!”
National Cyber Security Centre Threat Report 24 June 2022
Threat Report 24 June 2022 – NCSC.GOV.UK
New commercial spyware for phones
Google researchers are reporting on spyware that is active on both Apple and Android smartphones – the spyware is called Hermit and Google has taken steps to protect Android users. The software developed and marketed by RCS Lab, based in Milan, will exfiltrate messages ,contacts and password information from targeted …