Authentication, Authorisation and Accountability. This is the first part of a three-part series looking at the basics of the cyber security principle of “AAA”. Today we will start with Authentication It seems the easiest of principles. Everyone needs a username and password (credentials) to access any of your organisation’s systems. …
Biometrics
I had this article published yesterday on CyberAwake looking at biometrics and cyber security: We all thought biometrics were better security… (cyberawake.co.uk)
Elon’s Twitter messes up – roll on the scammers
Elon Musk’s new idea to move Twitter into profit, charging for the blue verification tick, had a fault in its design. Twitter was not verifying the users were who they we purporting to be – so the threat actors moved in very quickly pretending to be a range of celebrities, …
Continue reading “Elon’s Twitter messes up – roll on the scammers”
Have a look at LinkedIn’s new security features
The idea of LinkedIn is to enable communications and trust between its users – something the threat actors soon exploited. Fake profiles, offering fake jobs but installing real malware, stealing credentials and defrauding users. Now LinkedIn has introduced several new measures to combat fake identities and the malicious exploitation of …
Continue reading “Have a look at LinkedIn’s new security features”