Sometimes a cyber-attack is something as easy as adding a button saying “view document” when whale phishing senior people in an organisation. Ongoing Microsoft Azure account hijacking campaign targets executives (bleepingcomputer.com) Your takeaway When was the last time you audited the credentials and associated authorisations of those credentials? If you …
The truth about keyloggers and how easy it is to get the unwary to download one…
This is an excellent article by Xavier Mertens, with a video that demonstrates how a keylogger on your computer will defeat even the most complex of passwords. A Python MP3 Player with Builtin Keylogger Capability – SANS Internet Storm Center Your takeaway from this Have a policy in place stating …
Continue reading “The truth about keyloggers and how easy it is to get the unwary to download one…”
Let’s start the week with a Mac attack
I wrote about an Apple Mac attack last week – Macs too… – and we are going to start the week off with a Mac attack. Let me just quote the article here: “Still today, many people think that Apple and its macOS are less targeted by malware. But the …
Macs too…
I can still remember sitting in client meeting listening to the then minority Mac owners explain to me that Macs did not get hacked or get viruses. Of course, what they did not understand was that hackers then could not be bothered with Macs as there were far more juicy …
Time to kill off the password…
I have written about “going passwordless” and using passkeys before, but it looks like 2024 is going to be the year of the passkey. Here is an excellent explanation from the BBC – take just two and a half minutes and find out why you and your organisation need to …
