Here are a couple of short articles from the Google blog that describes the different ways the company actively combats the threat actors to improve everyone’s online safety: Meet the hackers keeping you safe online (blog.google) Continuous innovation to keep you safe online (blog.google)
Because It’s Friday… Data, Data, Data and do you know what a computer data punch card is?
Whilst researching for yesterday’s installment of the Insider Threat series, that I am writing over on our online training site CyberAwake, I read an article by Bret Arsenault, from Microsoft that opened with this quote: The amount of data captured, copied, and consumed is expected to grow to more than …
Another case of a false positive and why we must not let these incidents weaken our cybersecurity stance
The highly respected security software vendor Malwarebytes, slipped up this time, classifying Google and YouTube as malware for short time: Malwarebytes mistakenly blocks Google, YouTube for malware (bleepingcomputer.com) I recently wrote about false positives and their possible impact on the cyber security stance of an organisation – if you did …
CISA adds twelve vulnerabilities to the Known Exploited Vulnerabilities Catalog
These include products from Google, D-Link, QNAP, Apple, MicroTik, Oracle, Fortinet, Netgear and Android, with D-Link getting the most mentions. CISA Adds Twelve Known Exploited Vulnerabilities to Catalog | CISA
Apple moves to killing off the password…
Yesterday Apple had its September event where all the new toys were revealed, including iOS 16 – which will be on the new devices announced and available as an upgrade for iPhones going back to 2017. The new iOS and MacOS will both support passkey security rather than passwords. Apple …