News
VPN Logs. Should you be concerned?
I’ve been meaning to write this up since March when I talked about a VPN Leak situation. Are you aware that some VPN providers maintain logs about your usage of their service?
Read MoreWill your website be marked “Not Secure”?
Starting next week, some websites will be marked “Not Secure”. This is because the Chrome browser will no longer be highlighting secure websites, but will instead highlight insecure websites.
Read MoreA Sextortion Scam
The evil doers have launched a new sextortion scam on the internet. This one is interesting to say the least as it does use a technique to sucker you into believing it is real, without giving you any actual evidence of what they allege to have on you.
Read MoreWho’s been reading your Gmail?
For a long time the answer to the question “Who’s been reading your Gmail?” has been Google’s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being…
Read MorePosh POS was Compromised
A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor.
Read MoreMyFitnessPal Breach – Bigger than Equifax
The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the Equifax breach. Under Armour, the website’s owner, reported the breach yesterday.
Read MoreDoes Your VPN Leak Data?
It’s probably not a question most people would ask when they purchase a Virtual Private Network (VPN), but maybe you should ask “Does this VPN leak data?” It’s been revealed that several VPN providers are putting your privacy at risk by leaking some data that should be kept secret.
Read MoreCambridge Analytica were nosey ninnies
Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election.
Read MoreOverwhelming attack sets new record.
An overwhelming attack on a customer of a US service provider a few days ago has set a new record for the sheer volume of data used in the attack.
Read MoreIs somebody else using your password?
Is somebody else using your password? If your password is “123456”, then absolutely yes. Nearly 21 million other accounts use that same password. But how about “Gobbledegook”? That password is actually used by at least 9 other accounts. “LiamIsANiceHelpfulCyberSecurityPerson” has not been used before – I might use it for myself. ?
Read MoreWebsites compromised to generate money
“Wait, what?!?!?? Websites can generate money? I’ve got a website. What do I have to do to get my hands on some of that lovely cash?” Calm yourself, it’s not the website doing the money generation and you are not the beneficiary. The bad guys are! ?
Read MoreVulnerable Cisco Firewalls
It emerged last week that a security researcher had made a very significant discovery, which showed that popular firewalls made by Cisco had a vulnerability that was scored a perfect 10 out of 10 on the CVSS (Common Vulnerability Scoring System) scale.
Read MoreSneaky Tax Refund e-mails
Tax refund scam e-mails are nothing new. They’ve been doing the rounds for many many years at this stage. Like the “Nigerian Prince” scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.
Read MoreMeltdown and Spectre
You probably can’t have missed the reports about the cyber-Armageddon that are circulating today. Two very significant vulnerabilities have been found in the processor chips that are used by nearly every single computer, tablet, phone and smart toaster.
Read MoreWhat will 2018 bring?
So what will 2018 bring to us all in the areas of cyber security and data privacy/protection? I had a go at this predicting thing last year and you can see how I got on here.
Read More