The second part of my Back-to-Basics series looking at the cyber security risks and actions associated with the insider threat has been published today on CyberAwake. The Insider threat – Start thinking about sorting. (pt.2) – CyberAwake Did you miss part one? Not a problem: The Insider threat – Not …
If they annoy you enough…
…you might just give the threat actors your Google credentials. A malware campaign, detected by OALABS researchers, locks your web browser into “kiosk mode” and asks you for your Google credentials to unlock it. Of course, the malware then steals those credentials. Malware locks browser in kiosk mode to steal …
A real world QR code scam
I wrote about QR Code and cyber security over on CyberAwake back in June. Now BleepingComputer is reporting on “Your Boyfriend cheated” posters, which include a QR code and have been put up across the UK. Clickbaity or genius? ‘BF cheated on you’ QR codes pop up across UK (bleepingcomputer.com) …
Who do you trust? A new mini-series.
I have started a new mini-series over on CyberAwake looking at the Insider Threat. The Insider Threat – Not just a question of trust. (pt.1) The first part is setting the scene, before we start looking for defences.
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”