If so it is time to speak to your cyber security support and check if your customer’s data has been compromised? Ticketmaster confirms massive breach after stolen data for sale online (bleepingcomputer.com) The ransomware gang, Shiny Hunters, has tried to sell the Ticketmaster data on the Dark Web. Here is …
Android devices and cyber security
I have just started an IT and Cyber Security Audit for a client and we have barely started when the issue of mobile phone use has come up – because there are more cyber security risks with Android devices when compared to iOS devices. Over 90 malicious Android apps with …
Email phishing needs bait… (pt 5)
We looked at some of the most common types of email phishing attacks in the last part of this Back-to-Basics mini-series and I had promised you today an article on “size matters”, but I have changed my mind. Every day I read up on the latest threats and developments in …
Email Phishing Attacks
I have published part 4 of my Back-to-Basics mini-series looking at how phishing attacks work and how they impact organisations every day, over on CyberAwake. Phishing Primer – Phishing Types (pt. 4) Here are parts 1 to 3: Phishing Primer – Social Engineering (pt. 1) Phishing Primer – Social Engineering …
This is where I was yesterday…
7th Intl. Conference on Big Data, Cybersecurity & Artificial Intelligence Held in the spectacular main Lecture theatre on Edinburgh Napier University’s Craiglockhart Campus. The photo is of Professor Bill Buchanan’s opening keynote talk about AI and us. In between looking at how ChatGPT words can be found in university submitted …