News

A Sextortion Scam

Sextortion Scam

The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. 

Read More

Who’s been reading your Gmail?

Who's been reading your Gmail

For a long time the answer to the question “Who’s been reading your Gmail?” has been Google’s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being…

Read More

MyFitnessPal Breach – Bigger than Equifax

MyFitnessPal Breach

The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the Equifax breach. Under Armour, the website’s owner, reported the breach yesterday. 

Read More

Cambridge Analytica were nosey ninnies

Cambridge Analytica and Facebook

Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. 

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. 😏

Read More

Websites compromised to generate money

generate money by cryptomining

“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not the website doing the money generation and you are not the beneficiary. The bad guys are! 😨

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale.

Read More

Sneaky Tax Refund e-mails

Tax refund scam

Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.

Read More

Meltdown and Spectre

Meltdown

You probably can’t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster.

Read More

What will 2018 bring?

will 2018 bring

So what will 2018 bring to us all in the areas of cyber security and data privacy/protection? I had a go at this predicting thing last year and you can see how I got on here.

Read More

Review of my 2017 predictions.

2017 Predictions

I don’t see many people who make predictions for the coming year actually come back to review what they predicted. I’m not one of those though, so here is my review. I’ve included the original text below in blue, but the full article for my 2017 predictions is here.

Read More

Simple Security Planner tool for EVERYONE!

Security Planner

I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your loved ones, your friends and co-workers.

Read More

Video – 6 Examples of a data breach

6 examples of a data breach

Something new for us this time. A short video blog. This showing 6 examples of a data breach under the GDPR. The 6 examples are: A Lost or Stolen Laptop Sending e-mail to the wrong person. Disposal of confidential papers. Sharing of a password. Allowing copying of files to USB memory keys. Sending an e-mail…

Read More

Password Sharing = Data Breach

password sharing

I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought “That’s not a good idea. This person needs to receive some security awareness training.” I even have a commandment for it.

Read More