Time to make a coffee and have a look at Windows 11 and what Microsoft is doing to protect your work and organisations. The first article is by Microsoft – so treat it as such – but it does lay out clearly the aims and objectives of the operating system …
Android apps found with hidden malicious functions
The ability to sideload apps on an Android device, bypassing any curation in the Google Play Store and the apparent regularity that that app store misses malicious content in Android apps, is an constant cyber security issue for anyone using Android. Here are two recent examples: Android apps with 45 …
Continue reading “Android apps found with hidden malicious functions”
Voicemail social engineering scam targets WhatsApp users – three tips to help you spot the scams
This is a social engineering combining a phishing email and an attached voicemail file – that can evade many security systems, including Microsoft’s and Google’s, as it appears to be from a legitimate source. Hackers employ voicemail phishing attacks on WhatsApp users | TechRepublic Our Social Engineering and Email Cyber …
Borat is a triple threat RAT
Nothing to do with Sacha Baron Cohen. A remote access trojan, (RAT), is a holy grail of an infection for a hacker to get onto your system, as this powerful cyber crime tool allows full access and control of an infected system. Once a hacker has this much control they …
Volunteers in the cyber war
As part of our “weekend read” section, here is a piece by Chris Stokel-Walker and Dan Milmo at The Guardian looking at the hacker volunteers, fighting what they consider a white hat action against Russia. ‘It’s the right thing to do’: the 300,000 volunteer hackers coming together to fight Russia …
Israeli government websites disrupted
I have written recently about the increase in distributed denial-of-service (DDoS) attacks – here is a real world example of the effectiveness of these new massive attacks: Israeli govt sites hit by huge DDoS attack • The Register
Is this a new social engineering attack? New cyber security training courses announced at Octagon Technology
There are reports of the BazarLoader malware being spread via website contact pages: Cedric Pernet’s article on TechRepublic starts with an excellent quote/reminder: Everyone in the IT industry should be aware by now that email is the most used vector for cybercriminals to try to infect employees with malware. Cedric …