With a name like ‘Freaky Leaky SMS’ I had to cover this research. Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings (arxiv.org) At the moment this a research paper, the “attack” has only be carried out in the lab and it takes a large amount of preparatory work. …
Every major event will attract cyber criminals. What is your organisation doing on Monday 19 September?
The death of Her Majesty Queen Elizabeth II and the associated ceremonies and period of national mourning will be no exception: Potential phishing activity update – NCSC.GOV.UK The National Cyber Security Centre has issued a warning that the potential for malicious phishing, social engineering and scam cyber-attacks is very high …
Word of the day = Smishing
“Smishing” is similar to phishing but instead of using email the cyber criminals tempt you with a text message. Still targeting the usual suspects of your personal information and money. This report on scams and attacks being distributed using sms text messaging is US centric – but what happens over …