We have talked about Phishing and Social Engineering in other blogs and the standard precautions you can take to help thwart cyber criminals attempts at fraud. Business Email Compromise (BEC) is a form of cyber crime which uses email fraud to attack commercial, Government and non-profit organizations to achieve a specific outcome which negatively impacts… Continue Reading →
How often have you received an email (or for that matter an instant message) with marketing graphics embedded into it? I am guessing all the time? These marketing graphics are image files (GIF, JPG, PNG) that are added to the message. Remote Images Cyber criminals often include images in their phishing messages to represent the… Continue Reading →
As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China… Continue Reading →
A lot of people think that a cyber attack is immediately launched when you click on a link, or a hacker exploits a zero day vulnerability. This is not always the case and recent evidence shows that hackers are hiding in plain sight and waiting to launch their ultimate attack. Malware can infiltrate your systems… Continue Reading →
Just about everyone on the planet knows now that we have a COVID19 (Coronavirus) pandemic on our hands. However, cyber criminals are taking advantage of this current crisis, and people’s fears, to spread malware. I will post a list of validated and legitimate news sources at the end of this blog. What are Cyber Criminals… Continue Reading →
What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for… Continue Reading →
What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first… Continue Reading →
This week I noticed a report on how malware could be downloaded and installed using an Open Redirect from Cisco. Lets first define what an Open Redirect is. An open redirect is when a legitimate site allows unauthorized users to create URLs on that site to redirect visitors to other sites. For example, Google has… Continue Reading →
I would like you to take a look at the following web address: What do you see? Do you see microsoft.com? You would be very wrong if you did. Zoom in on the above picture. This address is actually RNICROSOFT.COM and not the address you first thought of. UNDER NO CIRCUMSTANCES GO TO ANY ON… Continue Reading →
This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: Backdoors File-less Malware Key Loggers Ransom Ware Root Kits Trojan Horses Viruses Wipers Worms. This can also include social engineering methods, which are often used to get the first foothold in installing… Continue Reading →
Defending against Malware is something we all need to do. This post will discuss a particular form of malware called Ransomware and how to put some defences in place to mitigate its effects. What is Ransomware? Ransomware is a form of malware that when it infects a system will encrypt files making then inaccessible to… Continue Reading →
Something went wrong. Please refresh the page and/or try again.
Headline photo provided by Shutterstock.