After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
Password Rules
Not for you but for developers and programmers. I they do not set effective password parameters then it can be too easy for a user to take a shortcut to a poor password and poor cyber security. NIST Recommends Some Common-Sense Password Rules – Schneier on Security Your Takeaway If …
Problems with QR Codes
Diana has written this week’s “Wednesday Bit” on QR Codes. Last week I became aware of a significant problem with QR codes, which are used by many organisations and individuals to direct people to their websites or sales pages. Such codes have been in use now for many years. (BizTechReports, …
The Insider Threat
The second part of my Back-to-Basics series looking at the cyber security risks and actions associated with the insider threat has been published today on CyberAwake. The Insider threat – Start thinking about sorting. (pt.2) – CyberAwake Did you miss part one? Not a problem: The Insider threat – Not …
If they annoy you enough…
…you might just give the threat actors your Google credentials. A malware campaign, detected by OALABS researchers, locks your web browser into “kiosk mode” and asks you for your Google credentials to unlock it. Of course, the malware then steals those credentials. Malware locks browser in kiosk mode to steal …