If you force all of your users to register to use the device or features, they have purchased and as part of that compulsory registration you collect sensitive and personally identifiable information – then make sure your cyber security is up to the job of protecting this information. Samsung is …
Sophos firewall hole fixed
If you are depending on a Sophos firewall then check and see that it is fully updated and patched: Sophos fixes critical code injection bug under exploit • The Register You of course have your Cyber Security “What is normal” document to hand, to check if this issue impacts your …
More security and privacy in the latest Windows 11 release
Here is an excellent outline of the latest security features updated or included in the new release of Microsoft Windows 11, by Jeff Burt over on The Register: What you’ll need to use Windows 11 22H2’s security features • The Register
Back to the supply chain and software compromise
When a threat actor compromises the coding of software the problems can be widepread – the SolarWinds attack and subsequent distribution of the infected software through legitimate update channels is a classic example. (Ironic but the SolarWinds customers who avoided the attack, were those with a poor cyber security stance …
Continue reading “Back to the supply chain and software compromise”
Do not be deceived by fake Zoom sites
Before downloading any Zoom apps, make sure you are on a legitimate site. Threat actors have created fake malicious sites, that do not provide Zoom apps but instead download Vidar Stealer, information stealing malware. Fake sites fool Zoom users into downloading deadly code • The Register This malware will exfiltrate …