Bruce Schneier has an interesting article today about impersonation. In this case it is bad actors abusing havard.edu email addresses. Using Fake Student Accounts to Shill Brands – Schneier on Security Impersonation is a real threat to any business, that does not have clear policies and procedures, and clear lines …
Attachments are a favourite attack vector
It obvious that for businesses to work they will be constantly exchanging email with clients, suppliers and internally and that many of these emails will contain important attachments. If we recognise this then so do the bad actors and they will exploit this business function if they can. Some attachments …
Continue reading “Attachments are a favourite attack vector”
Designing a contact tracing app
This is an excellent academic article by Susan Landau on the privacy, efficacy, and equity of contract-tracing on smartphone apps. She raises some important points about the social and economic divide when it comes to technology, something that other developers and technologists should consider when creating their apps. Digital exposure …
When Hacking is a Competition
Before we go on – hacking competitions are not illegal and many of them are organised across the world each year. They give a chance for the white hat hacking community to improve their skills and can often find flaws in software that benefit all of us. Once a cyber …