Apple is now offering a bounty of up to $2M for information leading to the identification of vulnerabilities in Apple software, firmware and operating systems. A major evolution of Apple Security Bounty, with the industry’s top awards for the most advanced research – Apple Security Research Your Takeaway This is …
Do you have a Dell computer?
I do – but it is not impacted by this vulnerability: ReVault flaws let hackers bypass Windows login on Dell laptops – BleepingComputer The hack allows threat actors to bypass the regular Windows login and security – but they do need to physically located with the victim’s machine and have …
The CIA Triad – Confidentiality, Integrity and Availability (pt. 1)Â
As part of this weeks summer cyber security webinar about encryption, I touched on the idea of how it can support the confidentiality, integrity and availability (CIA) of your information. In this article, we are going to expand on the CIA theme so you can see how encryption can help. …
Continue reading “The CIA Triad – Confidentiality, Integrity and Availability (pt. 1)Â “
An extra set of eyes – Remote Monitoring and Management
When it comes to cyber security it is always useful to have an ever vigilant monitoring system keeping an eye on the people and computers in your organisation. This is Remote Monitoring and Management (RMM) software – for a description of the advantage RMM will give your organisation have a …
Continue reading “An extra set of eyes – Remote Monitoring and Management”
Deepfake
The stakes can be high when threat actors invest the time and money into creating deepfake videos to hack an organisation, here an example from last year: You may not have $25m in your bank account but here is the state of play of deepfake hacking So tools that can …
