One of the things we advise people to do on our Phishing and Social Engineering training, is to be very aware of the look and feel of any login pages and web sites they are directed to, as bad actors may not get it completely right – so if they …
How to bust the cyber criminals – give them a messaging app with a backdoor for law enforcement agencies
This is an interesting short read from the Register: Backdoored chat app for crims was sold with tech supoprt • The Register The Australian Federal Police have released details on the joint operation which has stopped various crimes, including cyber-crimes, around the world. The distribution of the smartphone chat app …
More on securing your digital life
I blogged last week about some articles recommended by Bruce Schneier. There is a third part to the series. Securing Your Smartphone – Bruce Schneier Securing your digital life, part three: How smartphones make us vulnerable – Ars technica The article starts with a great quote: There are, by some …
Don’t tell him Pike!
Such is the sophistication of the bad actors on the web that it is easy to get caught out and let people steal your credentials. Have you seen those games on Facebook, where for example you are asked to give the name of your first pet and the road you …
Email rules
The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …