Even though users are reporting that the app is fake in the reviews on Google Play Store, it is still available for download and getting positive ratings. Malicious Android app found powering account creation service (bleepingcomputer.com) The actions of the app to hijack account creation processes for major services such …
USB data storage devices – useful but risky
A few weeks ago, I was asked to write an article looking at the ups and downs of using USB data storage devices in businesses: If you must use portable USB drives, then you must read this… – CyberAwake One of the down sides was the Japanese man who loss …
Continue reading “USB data storage devices – useful but risky”
Software supply chain weaknesses
Software and code repositories are a great resource for web and software developers – they save time, client’s money and get quality modules for their projects. GitHub is one of the most popular – with many major software players using it to develop their code and other developers, large and …
Do you have a question?
I have quoted this from Nathalie Jimenez’s article on the BBC: Cyber-crimes are expected to cost the world $10.5tn (£9.3tn) by 2025, according to cyber-security research firm Cyber Ventures… On the current trajectory, small businesses will absorb most of the hit. They are three times more likely to be attacked …
GitHub – probably one of the biggest targets for threat actors
GitHub is one of the most popular software repositories so it stands to reason that threat actors will always be searching for ways in as infecting code at source that is then reused in multiple applications is a cost-effective way to run a cyber attack. GitHub has just patched a …
Continue reading “GitHub – probably one of the biggest targets for threat actors”