Last Friday I ran a story on the use of so called USB condom to protect yourself from data theft via public USB charging ports. Now if that title is not click bait, then I do not know what is! Using my USB Condom This week I am away and …
Do you use a USB condom?
This is a nice little piece of “off the wall” cyber security. How many of us plug our phones and devices into public USB charging ports, in trains, hotels etc.? Have you ever thought that the port may be connected to a computer which could steal your data? Alright it …
Do you have a policy to securely dispose of your redundant equipment?
Or do you let your staff or IT Support sell it on eBay? $35M fine for Morgan Stanley after unencrypted, unwiped hard drives are auctioned | Ars Technica We do not resell equipment we are charged with disposing of securely.
Long term firmware compromise
This is an article looking at the invisible threat in our hardware – UEFI rootkit attacks. Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us | Ars Technica
If a software attack will not work – get out the wire cutters
This is not something that most of us will have to defend against – but it reads like a classic 1960’s spy story. The Unsolved Mystery Attack on Internet Cables in Paris | WIRED UK Do you want another cyber security story that reads like a 1960’s spy story – …
Continue reading “If a software attack will not work – get out the wire cutters”