Not all the news this week is going to be about a global company messing up their updates! Threat actors are always looking for the quickest and easiest way to reach the greatest number of victims – that is how their “business model” works! So exploiting a game with 250 …
Back-to-Basics – The Collection III
Having come back from a week’s holiday, I have been busy catching up, so this week the Wednesday Bit about reminding you about my collection of Back-to-Basics cyber security primers. Why am I doing this? Because we can all benefit from some cyber security training, whatever our level of expertise. The articles …
Back-to-Basics – A Phishing Email Primer
I am having a break this week from the “Wednesday Bit”, but what I do have for you is my today is my completed Phishing Email Primer. However my track record for these Back-to-Basics mini-series is that they do not stay “complete” for very long, so do keep an eye …
Android devices and cyber security
I have just started an IT and Cyber Security Audit for a client and we have barely started when the issue of mobile phone use has come up – because there are more cyber security risks with Android devices when compared to iOS devices. Over 90 malicious Android apps with …
Let’s finish the week with another device security article
Device security has definitely been the theme of this week and I thought this article by Dan Goodin on Ars Technica illustrated the problem of insecure devices – especially routers. Hacked and used by both threat actors and national espionage teams. Hacker free-for-all fights for control of home and office …
Continue reading “Let’s finish the week with another device security article”