This article started life in couple of ways. Over on CyberAwake I re-ran an article from summer 2022, looking at how some information, useful to a threat actor, could leak out of your organisation this summer, just because of the use of a simple setting in Outlook: The Out-Of-Office Email …
Not CrowdStrike – Kombat Hamsters
Not all the news this week is going to be about a global company messing up their updates! Threat actors are always looking for the quickest and easiest way to reach the greatest number of victims – that is how their “business model” works! So exploiting a game with 250 …
Back-to-Basics – The Collection III
Having come back from a week’s holiday, I have been busy catching up, so this week the Wednesday Bit about reminding you about my collection of Back-to-Basics cyber security primers. Why am I doing this? Because we can all benefit from some cyber security training, whatever our level of expertise. The articles …
Back-to-Basics – A Phishing Email Primer
I am having a break this week from the “Wednesday Bit”, but what I do have for you is my today is my completed Phishing Email Primer. However my track record for these Back-to-Basics mini-series is that they do not stay “complete” for very long, so do keep an eye …
Android devices and cyber security
I have just started an IT and Cyber Security Audit for a client and we have barely started when the issue of mobile phone use has come up – because there are more cyber security risks with Android devices when compared to iOS devices. Over 90 malicious Android apps with …