…make sure that you check carefully before installing any on your systems: Malicious extension lets attackers control Google Chrome remotely (bleepingcomputer.com) Malicious extensions also exist for all the other browsers out there not just Google Chrome.
Because It’s Friday – bringing two of my favourite Friday themes together…
Here is something from Scott Adams, to make you smile at the end of the week. It brings together coffee and artificial intelligence: Ai Based On Wally – Dilbert Comic Strip on 2022-11-02 | Dilbert by Scott Adams The cartoon got me thinking – kill the AI – which reminded …
Continue reading “Because It’s Friday – bringing two of my favourite Friday themes together…”
Malicious Android smartphone apps
Here are a couple of the current examples of Android malware that could compromise your organisation, reported in the technical press this week. New SandStrike spyware infects Android devices via malicious VPN app (bleepingcomputer.com) Malicious Android apps with 1M+ installs found on Google Play (bleepingcomputer.com) They have different malicious intent …
26 words written in 1995 that shape the Internet
No provider or user of an interactive computer service shall be treated as thepublisher or speaker of any information provided by another information content provider. Jeff Kosseff. Cybersecurity Law Professor at the United StatesNaval Academy This means, that unlike a newspaper or magazine who would be legally responsible for what …
Continue reading “26 words written in 1995 that shape the Internet”
What do you know about going passwordless? Find out here why you should do it.
Passwordlessness now extends to PayPal… …at least if you have an iPhone. PayPal ditches passwords, at least on Apple devices • The Register Ditching passwords is the best step in preventing the recycling of passwords by users and the subsequent credential stuffing attacks by threat actors. Find out in this …
Continue reading “What do you know about going passwordless? Find out here why you should do it.”