EOL – End of Life. With hardware this can mean that when the iPhone is dropped down the toilet or the laptop is dropped down the stairs, they have reached the end of their service life. But usually it is something more subtle – hardware reaches EOL when vendors stop …
I had not heard of eScan anti-virus…
…but a North Korean threat actor group had and they hijacked the update process to inject malware into the “protected” systems. Researchers at Avast believe the group is the North Korean APT group Kimsuki. The malware installs GuptiMiner – a crypto-miner – and disables several other security precautions if they …
Encryption – A Primer
Over the past couple of weeks, I have been writing a short series looking at the basics of encryption, how you can use it to improve your cyber security and some of the issues you need to address if you are using it. As I have done with other mini-series …
It is a while since I have written about Ransomware
Once ransomware gets into an organisation, usually through some type of phishing attack, that organisation will have a problem that will cost it money and will damage its reputation. So, anything that makes it easier for ransomware attacks to flourish and increase has to be bad news for every organisation …
Continue reading “It is a while since I have written about Ransomware”
Social Engineering is real and costs organisations money – get your team trained.
First let’s get a definition of social engineering: Social engineering is the art of manipulating people to give up confidential information. The types of information compromised can vary, but when organisations are targeted, the criminals are usually trying to trick you into giving them your credentials for secure systems you …
Continue reading “Social Engineering is real and costs organisations money – get your team trained.”