Catch up with what the zero-day threat is, that your organisation is facing here: As a zero-day flaw is such a useful way in for threat actors to a system, it is no surprise that there is monetary value for zero-day vulnerabilities between hackers, for hacking, “legitimate” software who produce …
Includes “AI” for your convenience!
I have lost track of the number of services that I am being offered include “AI” to make them better, more helpful, intuitive, etc., etc., etc.. Even my Microsoft 365 for Business comes with AI interfering, sorry helping at every turn. But what happens when the threat actors get their …
AI and your Cyber Security
This article by Oli Buckley, Professor of Cyber Security at the University of East Anglia and Jason Nurse, Associate Professor in Cyber Security at the University of Kent takes a balanced look at how AI is starting to help threat actors create more believable attacks. Cybercriminals are creating their own …
Is Bluetooth broken?
Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …
How to Bypass Windows Hello
Cyber security researchers by their very nature are always prodding and poking at systems to see what they can break. This time Jesse D’Aguanno and Timo Teräs on behalf of Microsoft’s Offensive Research and Security Engineering (MORSE) have bypassed the Windows Hello (biometric) security systems on some of the most …