If you force all of your users to register to use the device or features, they have purchased and as part of that compulsory registration you collect sensitive and personally identifiable information – then make sure your cyber security is up to the job of protecting this information. Samsung is …
Reflections
Here is a threat that is being actively researched, but probably is not that big a deal – that is of course until we get to reality resolution screens and webcams… [2205.03971] Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing (arxiv.org) However… The …
Do not be deceived by fake Zoom sites
Before downloading any Zoom apps, make sure you are on a legitimate site. Threat actors have created fake malicious sites, that do not provide Zoom apps but instead download Vidar Stealer, information stealing malware. Fake sites fool Zoom users into downloading deadly code • The Register This malware will exfiltrate …
If there is way for threat actors to abuse legitimate tools, of course they do it!
Google’s Tag Manager (GTM) is a system for managing HTML and Javascript analytic tags on website, especially ecommerce sites. A report by The Recorded Future has found that threat actors have been installing malicious e-skimmers scripts that can steal customer card data and other personally identifiable information exploiting GTM. Google …
Do not use the password Qwerty1234 – the hackers know that one!
It is being reported that the hack on the Holiday Inn was done for fun and that the hackers, from Vietnam, used the password Qwerty1234 to gain access. IHG hack: ‘Vindictive’ couple deleted hotel chain data for fun – BBC News If you want your people to have a better …
Continue reading “Do not use the password Qwerty1234 – the hackers know that one!”