Such is the sophistication of the bad actors on the web that it is easy to get caught out and let people steal your credentials. Have you seen those games on Facebook, where for example you are asked to give the name of your first pet and the road you …
Email rules
The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …
Do not overshare information
It started as a simple desire to add the dates and times to my calendar when the San Francisco 49ers were playing their matches. Unlike many (most) people I read the terms and conditions and exactly what the service wanted me to share with them! In this article I eventually …
Twitter hack
High profile hacks are always going to make the mainstream news – add to that celebrities, influencers, Bitcoin and the fact the hackers netted about £80,000 before being closed down – then the Twitter hack was always going to make big headlines. Here is a link to the BBC article, …