We often find problems with client configurations when we take over jobs, particularly when less-technically-able client try to do-it-themselves. If anyone needs an example as to why getting things set up correctly is difficult, Microsoft made a mistake with a server config and exposed some of their client’s information: Microsoft …
Negotiating with cyber criminals is not recommended…
For a start they are criminals, trying to extort you. I have heard business owners comment on ransomware gangs as though they are businesses you need to interact with. Now I know threat actors are shaping themselves to be business like with, help desks, means of paying the ransoms, public …
Continue reading “Negotiating with cyber criminals is not recommended…”
I refer you to yesterday’s blog post…
Another report of Android malware getting into the play store: Fake antivirus, Sharkbot circles back onto Google Play store | NCC Group Newsroom (mynewsdesk.com) Do you have a position on Android devices and their use by your team when they are processing your information on them? You should have! Yesterday’s …
More Android malware
I wonder, is ransomware or Android malware the most prolific attack vector? I am constantly reporting on both – so I hope you have all taken steps to defend against both. New Android malware ‘RatMilad’ can steal your data, record audio (bleepingcomputer.com) Cheerscrypt ransomware linked to a Chinese hacking group …
At last, the real issue when big (or small) companies get hacked and control of collected PII is lost…
If you force all of your users to register to use the device or features, they have purchased and as part of that compulsory registration you collect sensitive and personally identifiable information – then make sure your cyber security is up to the job of protecting this information. Samsung is …