I think if you read this blog, you have a smartphone and that the security of that smartphone is important to you. By now you should also understand that the functionality of that smartphone is a trade off between your privacy with the various suppliers. I do not use some …
WordPress hack
Many of us use WordPress for our web sites – if you do not know what your web designer is using for you website, then you have a cyber security issue, and you or your cyber security consultant should get in contact with your web designer ASAP. Here is one …
Tourist rebound after COVID-19 is an obvious target for phishing attacks
Research company Proofpoint, has shown that the threat actor, tracked as TA558, has increased it’s phishing campaigns targeted at hotel and travel companies, to coincide with the rapid increase in foreign travel as the pandemic decreases. Hackers target hotel and travel companies with fake reservations (bleepingcomputer.com) Threat actors are always …
Continue reading “Tourist rebound after COVID-19 is an obvious target for phishing attacks”
National Cyber Security Centre Threat Report 19 August 2022
Threat Report 19th August 2022 – NCSC.GOV.UK
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
The vulnerabilities apply to SAP, Apple, Google, Palo Alto and Microsoft products. CISA Adds Seven Known Exploited Vulnerabilities to Catalog | CISA