…just slow down. I often use the example of a successful social engineering/phishing email as one that arrives when you are under work pressure or just before before you want to leave for the weekend. Both are periods when the threat actors know your guard will be down – they …
The bad guys do not always get it right…
I write a lot of bad news stories here, it is the nature of a cyber security news site – that’s why we have Because It’s Friday – but here is a good news story when the threat actors get it wrong: First Linux variant of Clop ransomware targeted universities, …
Encryption is safe (for the moment)
You can carry on shopping online… At the beginning of the year I ran a short story on some Chinese research that said it had taken a step towards breaking the encryption we all depend on the use the internet and electronic communications securely: Breaking encryption – Smart Thinking Solutions …
Breaking encryption
Encryption is a fundamental element of our security and privacy online. Without it you could not shop online using your credit card or have a private conversation. Encryption is is encoding of your information using computational methods – the more complicated the computations the more secure the encryption is. But …
Car security again
This is proving to be a fertile ground for cyber security researchers. I wonder, how many dissertations this continual issue is going to generate? One of the under lying issue here is technology being pushed beyond what it was originally designed for and lacking the underlying high security the applications …
Ransomware attacks are down – but here is why the headline statistic is not going to help with your cyber security…
A report from SonicWall shows that the number of Ransomware has dropped over the past months – however this is not the good news it appears to be as they have only dropped from the record highs of 2020/2021 and are still way above levels previous to that. 2022 SonicWall …
Tesla hacking… and a practical solution
Hacking the technology in a Tesla car is almost becoming its own sub-genre of cyber-attacks. This one exploits the technology used in the electronic key fob. NFC Relay Attack on TESLA Model Y (ioactive.com) A relay attack is where the hacker stands behind you in the petrol station queue, although …