Google’s security team have released a report outlining the active threats they have detected against their services. It includes a number of recommendations to help their users improve their security. Here is the blog: Coin mining, ransomware, APTs target cloud: GCAT report | Google Cloud Blog Here is the full …
Is your password “liverpool”?
Is your password on this list? Before we start – the above statement sets the wrong tone for this article – it implies that you have a singular “password” but as we all know that is not true – you need many. However the social media people wanted that wording! …
Do not click on the attachment – whatever it is called!
Before you open any attachment you should think about it: Are you expecting an attachment from this sender? Does this sender normally send you attachments like this? If you do not recognise the attachment extension then do not open it. Best practice is NOT TO OPEN any unexpected attachments! It …
Continue reading “Do not click on the attachment – whatever it is called!”
Defunct botnet shows signs of life – cybersecurity advice for you!
The SANS Internet Storm Diary is reporting that the Emotet botnet, that was taken down earlier this year by worldwide Co-operation of law enforcing has started to show up again on their monitoring. Emotet Returns – SANS This botnet distributes malicious packages via email attachments and then deploys these packages …
Continue reading “Defunct botnet shows signs of life – cybersecurity advice for you!”
More on securing your digital life
I blogged last week about some articles recommended by Bruce Schneier. There is a third part to the series. Securing Your Smartphone – Bruce Schneier Securing your digital life, part three: How smartphones make us vulnerable – Ars technica The article starts with a great quote: There are, by some …