As computing power increases and the ability of cloud platforms and software to create realistic deepfake impersonations of people improves, so does the increased use of such techniques by threat actors – of course. Here are a couple of articles looking at the technology and the threat: Seeing is disbelieving: …
How a phishing attack works
Today there is an excellent illustration of how a phishing attack works on SANS Internet Storm. It is complete with the offer of something the victim wants and then simply steals the Microsoft credentials the victim supplies – all because of a well-crafted spam email. Credential Harvesting with Telegram API …
This cyber attack has still not been fixed… UPDATE
This post was first published on 31 August 2022 Update 5 October 2022 The cost of this attack – to the local taxpayer – is now predicted to be £1m. Russia-linked cyber attack could cost Gloucester City Council £1m – BBC News “Every time I ask the question about the …
Continue reading “This cyber attack has still not been fixed… UPDATE”
Macs are not immune to cyber attacks
I used to sit in meetings where clients, often who were in marketing or a creative activity, who happily tell me “Macs don’t get viruses”. Well that was in the days when the handful of creatives using Macs were not viable targets to the hackers. Roll forward to today where …
New simple security feature in Windows
The latest release of Windows 11, now includes Enhanced Phishing Protection, which sounds complicated, and I am sure the implementation of it is complex, but the security advantage it offers is obvious and simple. Windows 11 will warn you when you type a password into an insecure website or application. …