Having read Ben’s article on Phishing Email, this morning, before posting it to Smart Thinking as part of my Back-to-Basics Email Phishing Primer, I was reminded of a Bruce Schneier article and associated research paper I read last week – looking at how anyone can end up following a misleading …
Why zero-day threats are a problem.
Catch up with what the zero-day threat is, that your organisation is facing here: As a zero-day flaw is such a useful way in for threat actors to a system, it is no surprise that there is monetary value for zero-day vulnerabilities between hackers, for hacking, “legitimate” software who produce …
Includes “AI” for your convenience!
I have lost track of the number of services that I am being offered include “AI” to make them better, more helpful, intuitive, etc., etc., etc.. Even my Microsoft 365 for Business comes with AI interfering, sorry helping at every turn. But what happens when the threat actors get their …
AI and your Cyber Security
This article by Oli Buckley, Professor of Cyber Security at the University of East Anglia and Jason Nurse, Associate Professor in Cyber Security at the University of Kent takes a balanced look at how AI is starting to help threat actors create more believable attacks. Cybercriminals are creating their own …
Is Bluetooth broken?
Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …
