I am not sure anyone is actually calling it that… We have all seen and or heard of this story that is running in the US and around the world: Trump and intelligence chiefs play down Signal group chat leak – BBC News I am not going to get into …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …
Not every hack requires a computer…
We can all get focused cyber security and technology, our computers, networks, phones and devices etc.. My Cyber Security Awareness Training also discusses the cyber security issue that come by way of text messages and phone calls. But just when we thought we had all the bases covered, hackers discover …
When technical cyber security fails you…
It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware and cyber extortion is on the rise (Beaman, Barkworth, Akande, Hakak and Khan. 2021 and Oz, Aris, Levi and Uluagac. 2021), and that cyber security is important. We all take precautions …
Privacy and Encryption
Over the past few weeks, I have been writing about privacy for CyberAwake – I have linked the articles below – and at the same time, I was reading up on encryption for an article here last week on the value of encryption – Encryption or Not Encryption. Both sets …