I have just published the second part of a series of articles looking at the governance that business owners and boards should exercise over software, websites and their reputation:
Stress – the classic social engineering tactic
Threat actors have to find ways of breaking down our cyber security training – that is where social engineering comes in. They want to find some way to get you to do what they want – this usually means exploiting your trust, but a bt of stress in there to …
Continue reading “Stress – the classic social engineering tactic”
My latest article on CyberAwake
I want you to start to think about the software you and your people use, on your PCs, on the web, on your tablets and smartphones and on your website: Just Check Cyber Security Due Diligence – CyberAwake
If you need more evidence that you need to do something about email phishing and social engineering – here it is…
McAfee Fake Antivirus Phishing Campaign is Back! – SANS Internet Storm Center …and… New zero-day vulnerability in Windows being exploited Phishing emails in the wild – how can this infect you? The story of a phishing email I have written a lot lately about phishing campaigns, all of which have …
Newly discovered zero-day vulnerability in Windows is being exploited now
Zero-day attacks will always be a serious issue for anyone involved in cyber security. A zero-day cyber attack is one that happens in the gap between the hackers discovering a vulnerability in a system and putting an exploit out in the wild and the software vendors, discovering the same software …
Continue reading “Newly discovered zero-day vulnerability in Windows is being exploited now”