Software and hardware does have a use by date. Even though the equipment or software may still appear serviceable, if the vendor stops supplying updates, then the threat actors will start looking for vulnerable unsupported targets. Martin has written about this over on the Octagon Blog this month: Older versions …
Vapor Apps
There are good weeks for some Android users: And then there are bad weeks: Malicious Android ‘Vapor’ apps on Google Play installed 60 million time – BleepingComputer The nature of Android devices can make then vulnerable to cyber-attacks and makes them a target for threat actors. Read about how this …
A good week for Android devices
I have written about the issues with keeping Android device securely patched, especially when contrasted with the Apple approach to iPads and iPhones. You can catch up with these considerations here: Devices and Cyber Security – A Primer | Smart Thinking Solutions This week though I have three good news …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
Bring Your Own Device (BYOD) – A Primer
It is so easy for an organisation to just let their staff use their own devices – it can save a lot of expense – but no organisation should let BYOD “just” happen. This series will help you understand what BYOD has to be a choice benefiting both the organisation …
