Here are two informative articles from the BBC looking at two different cyber-attacks. The first is a look at an attack on Redcar and Cleveland Council in February 2020, which for the rest of us got overtaken by world events but for those living and working in the region it …
If your plan to defeat ransomware is to pay up then read on…
With the cyber-attacks on UK retail stores making the headlines over the last couple of weeks, I thought I would rerun this article (from CyberAwake, August 2022) on the pros and cons of paying the ransomware gangs. NCSC and the ICO say – Don’t pay the malware ransom. A couple …
Continue reading “If your plan to defeat ransomware is to pay up then read on…”
Signalgate
I am not sure anyone is actually calling it that… We have all seen and or heard of this story that is running in the US and around the world: Trump and intelligence chiefs play down Signal group chat leak – BBC News I am not going to get into …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …
Not every hack requires a computer…
We can all get focused cyber security and technology, our computers, networks, phones and devices etc.. My Cyber Security Awareness Training also discusses the cyber security issue that come by way of text messages and phone calls. But just when we thought we had all the bases covered, hackers discover …