Luas Ransomware Incident – Offline a while now

Luas Ransomware

How did you hear about the Luas Ransomware incident? Was it on the news? Online? Facebook? Twitter? Instagram? Or did you happen to visit the website to check some fare…

Read More

Review of my 2018 predictions.

2018 predictions

I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one…

Read More

The Chinese hacking server hardware

Chinese hacking server hardware

You may have heard some pretty scary headlines or stories recently about a Bloomberg Businessweek article. This was about the Chinese hacking server hardware by implanting little “bugs” onto the…

Read More

How to deal with Ransomware.

Deal with Ransomware

I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either…

Read More

Sextortion scam – a follow up.

Sextortion scam follow up

This time last month I posted about a sextortion scam that was sending out large amounts of emails to people claiming to have recorded them watching porn. As proof that they…

Read More

VPN Logs. Should you be concerned?

VPN logs

I’ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of…

Read More

Will your website be marked “Not Secure”?

be marked "Not Secure"

Starting next week, some websites will be marked “Not Secure”. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites. 

Read More

A Sextortion Scam

Sextortion Scam

The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into…

Read More

Posh POS was Compromised

POS was compromised

A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &…

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is…

Read More

Websites compromised to generate money

generate money by cryptomining

“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not…

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect…

Read More

Meltdown and Spectre

Meltdown

You probably can’t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly…

Read More

What will 2018 bring?

will 2018 bring

So what will 2018 bring to us all in the areas of cyber security and data privacy/protection? I had a go at this predicting thing last year and you can…

Read More

Review of my 2017 predictions.

2017 Predictions

I don’t see many people who make predictions for the coming year actually come back to review what they predicted. I’m not one of those though, so here is my…

Read More