Chatbot phishing

Social engineering definition on a chalk board

Phishing campaigns usually depend on social engineering and threat actors are always looking for new ways to exploit your trust: Phishing scam adds a ‘chatbot-like’ twist to steal credit card information and more – The Record by Recorded Future

I wrote some simple malware to steal credit card data and how that connects to a Texas data breach

OK it was part of my Master course, and it was an attack against a sand-boxed compromised server, and the malware, to be honest, would not last a moment in the real world with the current state of the art when it comes to protecting customer payment information. However the …

Privacy gets a boost in Connecticut

Connecticut state flag

With California, Colorado, Utah and Virginia, Connecticut is the fifth US State to introduce laws protecting user’s privacy. Connecticut becomes fifth state with data privacy law – The Record by Recorded Future

I really like this – more transparency in the Google Play Store and the way apps will use your personal information

Android devices

This new policy from Google is an excellent step in improving the trust between the app developers and the users of their software. Android users who use the Play Store will start to see a Data safety section on each app page. Developers have until July 20th to complete this …

Why you need to look at your cybersecurity risks and mitigations

Here are a couple of longer articles, that give you some idea into the scale of cyber security and information security responsibilities, owners, directors and senior managers face in the current threat landscape. Over 42 million people in the UK had financial data compromised | TechRepublic Report: Many SMBs wouldn’t …