Dodgy extensions and not a builder in sight.

A lot of normal people might think about the phrase “dodgy extensions” and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse.

Read More

Sextortion scam – a follow up.

Sextortion scam follow up

This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they meant business, they included an old password the victim had previously used. There have been some developments.

Read More

A Sextortion Scam

Sextortion Scam

The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. 

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. ?

Read More

Sneaky Tax Refund e-mails

Tax refund scam

Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.

Read More

Password Sharing = Data Breach

password sharing

I saw the tweet below about password sharing from Nadine Dorries, currently a British MP and initially thought “That’s not a good idea. This person needs to receive some security awareness training.” I even have a commandment for it.

Read More

Double check your security.

Double Check Security

There is an easy double check that you can implement which will offer you excellent protection. It is called two factor authentication (or two step verification).

Read More

Yahoo breach – Round 3 … Billion! ?

yahoo breach

If you had a Yahoo!, BT or Sky e-mail account (also AT&T, Frontier.com and Rogers) back in 2013, well you are definitely part of the latest and greatest Yahoo breach.

Read More

Deloitte breach is very embarrassing.

deloitte breach

The Deloitte breach that was revealed by the Guardian last week was incredibly embarrassing for the firm. They have been named Gartner’s No. 1 Security Consultancy for 5 years in a row ?.

Read More

Company that makes smart Teddy Bear’s leaked data.

Evil Teddy Bear

It has just been reported that up to 800,000 people who owned a Smart Teddy bear made by Spiral Toys, under the CloudPets banner have had their account data stolen by hackers. Now this blog is about this particular toy, but this could easily apply to other types of “smart toy” so do read on.…

Read More

Scary new way to have your GMail password and account stolen.

This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ? So what happens is you receive an e-mail from somebody you know, who also had a GMail (note the emphasis on had). 

Read More