When I am delivering the cyber awareness training – and people relax, realising I really mean it when I say there are no stupid questions – I often get asked “how do I know if my computer was infected?”. Usually just before being asked about the length of a piece …
When redacting does not work
We all see redacting n the TV shows and movies we watch – documents with big black lines through the secret information that must not be revealed – and I use similar techniques for screenshots I use here to conceal secret information. I am sure you do the same. I …
CISA security advisory for Drupal
Drupal is a CMS platform, similar to WordPress, so it is out there on the internet, vulnerable for exploitation. So if you use Drupal get it patched: Drupal Releases Security Advisory to Address Vulnerability in Drupal Core | CISA Do you know if your organisation’s website is hosted on Drupal …
As promised yesterday…
… more about extortion ransomware and what you can do about defending your information from it: From Encryption Ransomware To Extortion Ransomware Part I – CyberAwake This first part looks at defending critical accounts from compromise.
Extortion only – no encryption
Ransomware is known for encrypting your data then demanding money for the key to recover your information (probably). Then ransomware moved on to not only encrypting but stealing your information and then extorting another ransom from you to not release or sell your information. Now there is ransomware that skips …
