I am often asked this question by clients and particularly prospective clients, who think they do not need our cyber security awareness training or any of the tools in our security stack. The answer to the question is not easy, in a Word or OneNote file, through a link to …
Because It’s Friday – two stories about code breaking
Well actually one story and one video. After five centuries these secrets are finally revealed Modern day computer technology got a kick start in World War II when it was developed to crack codes. Google Bletchley Park, where one of these crypto computers and Alan Turing were based, and watch …
Continue reading “Because It’s Friday – two stories about code breaking”
The “hidden in plain sight” cyber attack
Steganography When we were looking at steganography cyber attacks – hiding malicious code inside for instance image files – I was surprised just how much malware could be hidden without degrading the image. Here is a real-world example of this rare type if attack, spy are code embedded in a …