We have talked about Phishing and Social Engineering in other blogs and the standard precautions you can take to help thwart cyber criminals attempts at fraud. Business Email Compromise (BEC) is a form of cyber crime which uses email fraud to attack commercial, Government and non-profit organizations to achieve a specific outcome which negatively impacts… Continue Reading →
A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems… Continue Reading →
Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people’s fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals… Continue Reading →
What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for… Continue Reading →
What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first… Continue Reading →
This week I noticed a report on how malware could be downloaded and installed using an Open Redirect from Cisco. Lets first define what an Open Redirect is. An open redirect is when a legitimate site allows unauthorized users to create URLs on that site to redirect visitors to other sites. For example, Google has… Continue Reading →
I would like you to take a look at the following web address: What do you see? Do you see microsoft.com? You would be very wrong if you did. Zoom in on the above picture. This address is actually RNICROSOFT.COM and not the address you first thought of. UNDER NO CIRCUMSTANCES GO TO ANY ON… Continue Reading →
This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: Backdoors File-less Malware Key Loggers Ransom Ware Root Kits Trojan Horses Viruses Wipers Worms. This can also include social engineering methods, which are often used to get the first foothold in installing… Continue Reading →
Defending against Malware is something we all need to do. This post will discuss a particular form of malware called Ransomware and how to put some defences in place to mitigate its effects. What is Ransomware? Ransomware is a form of malware that when it infects a system will encrypt files making then inaccessible to… Continue Reading →
In the era of cloud computing, where we see all forms of online services provided for a subscription, it is probably not surprising that we see dark net services providing malware as a service. While not necessarily something most of us would want to subscribe to, there are dark web sites that provide forms of… Continue Reading →
Today we totally rely on USB based devices to run our lives. Our phones charge using a USB cable, we connect flash drives through a USB connection to our PC’s and phones. We even attach WiFi dongles and ethernet adaptors using USB. USB is also evolving into faster data transfer speeds to the point now… Continue Reading →
Something went wrong. Please refresh the page and/or try again.
Headline photo provided by Shutterstock.