We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of […]
Category Archives: Uncategorised
Explained: juice jacking Posted: November 21, 2019 by Pieter Arntz When your battery is dying and you’re nowhere near a power outlet, would you connect your phone to any old USB port? Joyce did, and her mobile phone got infected. How? Through a type of cyberattack called “juice jacking.” Don’t be like Joyce. Although Joyce […]
Creative Networks are looking for a Second Line IT Support Engineer to provide effective onsite technical support to contract customers, for desktop/laptop/printer/application issues and installations as well as basic network/server troubleshooting and administration. A key aspect of the role is to communicate effectively with the customer and manage technical queries in line with our […]
Children’s Tablets Leave Users Vulnerable At least one LeapPad tablet designed specifically for children has been found to harbor critical vulnerabilities in the app Pet Chat that could allow unauthorized access to online traffic. The vulnerabilities could be used locate the tablet’s owner by creating a temporary WiFi network to help the user connect […]
Kaspersky researchers recently found malware in an app called CamScanner, a phone-based PDF creator that includes OCR (optical character recognition) and has more than 100 million downloads in Google Play. Various resources call the app by slightly different names such as CamScanner — Phone PDF Creator and CamScanner-Scanner to scan PDFs. Official app stores such […]
Good old e-mail isn’t the sexiest offering in the digital world, but amid a whole bunch of newer apps and services — the instant messengers, the social networks — it’s standing its ground as an essential tool for modern-day life. Most of us still have to use e-mail, at the very least to be able […]
It’s an oft-repeated tale: Someone talks with a friend about a certain thing, and then, bang, an ad for it appears on the smartphone screen. Some cases are easy to explain. A colleague of mine who was about to get married claims that she never googled wedding dresses, yet the pesky search engine started suggesting […]
Global messaging giant WhatsApp turned 10 years old this year. It’s not unusual for companies to provide loyal customers or members with gifts to show their appreciation during these milestones. Unfortunately, cybercriminals are using this as a ploy to carry out their malicious schemes. According to Forbes, security researchers have discovered a fraudulent message promising […]
5 Tips for Using Smart Devices Safely and Responsibly If a genie were to grant your every household-management wish, you’d waste no time making demands: “Add milk to my grocery list”; “Lock the doors”; “Help my kid with algebra”! The same kind of magic can be had in smart devices — for a price […]
iPhones have a reputation for being notoriously secure. After all, they caused quite the kerfuffle between Apple and the FBI because they are, from the FBI’s point of view, too secure! However, don’t let that lull you into a false sense of security. Using an iPhone is not an automatic guarantee of invulnerability. The good […]