My personal delivery scam. I was working at my desk the other day, thinking about stopping for lunch, when I got the following text message: Now I was waiting for a delivery, I had ordered a camping kettle from AliExpress, but the last time I looked it was not scheduled …
Identity Theft (part 1)
Identity theft, as cyber attacks go, is pretty easy to understand – a threat actor gains control of a user’s credentials (identity) and then attacks the service (organisation), posing as that user. There are nuances but that is the attack in the briefest of terms. Credential and identity theft are …
Pancakes and Cyber Security
I know it is not Wednesday – but here is the “Wednesday Bit” early because today is Pancake Day. Flipping Your Cyber Security: Lessons from Pancakes So, what can pancakes teach us about flipping your cyber security? Just like making the perfect pancake, keeping your business secure requires the right …
When technical cyber security fails you…
It is not unreasonable to say that ransomware is at epidemic levels, report after report says that malware, ransomware and cyber extortion is on the rise (Beaman, Barkworth, Akande, Hakak and Khan. 2021 and Oz, Aris, Levi and Uluagac. 2021), and that cyber security is important. We all take precautions …
Continue reading “When technical cyber security fails you…”
Privacy and Encryption
Over the past few weeks, I have been writing about privacy for CyberAwake – I have linked the articles below – and at the same time, I was reading up on encryption for an article here last week on the value of encryption – Encryption or Not Encryption. Both sets …
