I have published part 4 of my Back-to-Basics mini-series looking at how phishing attacks work and how they impact organisations every day, over on CyberAwake. Phishing Primer – Phishing Types (pt. 4) Here are parts 1 to 3: Phishing Primer – Social Engineering (pt. 1) Phishing Primer – Social Engineering …
Phishing Primer – Social Engineering (pt. 1)
Just because it is me, I am going to start this Back-to-Basics mini-series by not talking about phishing emails but looking at a key component of a malicious email attack – social engineering. So what is Social Engineering? In its most basic form, it is the advertising we are all …
Continue reading “Phishing Primer – Social Engineering (pt. 1)”
How to deceive an LLM AI
Bruse Schneier has an excellent article on how large language model AIs are being maliciously manipulated because of an old-style vulnerability being exploited. AT&T was probably the first organisation hit by such an attack that exploits systems that use the same channel for both data and commands. Back in the …
Something extra for the weekend.
“Beacuase It’s Friday” has been published for this week – Because It’s Friday – Electronic Mail | Smart Thinking Solutions – but as I was reading the cyber security news this morning this page came up on my BBC News feed. A BBC Newsround report from 1992 about the Michelangelo …
Back to Basics – The Collection II
This week the Wednesday Bit is for reminding you about my collection of mini-series and back to basics cyber security primers. There have been a number of additions, updates and changes since I first ran a “Collection” article. Why am I doing this? Because we can all benefit from some …