VPN Logs. Should you be concerned?

VPN logs

I’ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service?

Read More

Will your website be marked “Not Secure”?

be marked "Not Secure"

Starting next week, some websites will be marked “Not Secure”. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites. 

Read More

A Sextortion Scam

Sextortion Scam

The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you. 

Read More

Who’s been reading your Gmail?

Who's been reading your Gmail

For a long time the answer to the question “Who’s been reading your Gmail?” has been Google’s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being…

Read More

Posh POS was Compromised

POS was compromised

A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor. 

Read More

MyFitnessPal Breach – Bigger than Equifax

MyFitnessPal Breach

The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the Equifax breach. Under Armour, the website’s owner, reported the breach yesterday. 

Read More

Does Your VPN Leak Data?

VPN leak

It’s probably not a question most people would ask when they purchase a Virtual Private Network (VPN), but maybe you should ask “Does this VPN leak data?” It’s been revealed that several VPN providers are putting your privacy at risk by leaking some data that should be kept secret. 

Read More

Cambridge Analytica were nosey ninnies

Cambridge Analytica and Facebook

Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. 

Read More

Overwhelming attack sets new record.

Overwhelming attack

An overwhelming attack on a customer of a US service provider a few days ago has set a new record for the sheer volume of data used in the attack. 

Read More

Is somebody else using your password?

Is somebody else using your password

Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. ?

Read More

Websites compromised to generate money

generate money by cryptomining

“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not the website doing the money generation and you are not the beneficiary. The bad guys are! ?

Read More

Vulnerable Cisco Firewalls

vulnerable cisco

It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale.

Read More

Sneaky Tax Refund e-mails

Tax refund scam

Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.

Read More

Meltdown and Spectre

Meltdown

You probably can’t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster.

Read More

What will 2018 bring?

will 2018 bring

So what will 2018 bring to us all in the areas of cyber security and data privacy/protection? I had a go at this predicting thing last year and you can see how I got on here.

Read More