Under the GDPR, DPIAs (data protection impact assessments) are mandatory for data processing that is “likely to result in a high risk to the rights and freedoms of data subjects”. Effectively a type of risk…
Hacking Weapons Systems
Lukasz Olejnik has a good essay on hacking weapons systems. Basically, there is no reason to believe that software in weapons systems is any more vulnerability free than any other software. So now the question…
Backdoor Added — But Found — in PHP
Unknown hackers attempted to add a backdoor to the PHP source code. It was two malicious commits, with the subject “fix typo” and the names of known PHP developers and maintainers. They were discovered and…
Google’s Project Zero Finds a Nation-State Zero-Day Operation
Google’s Project Zero discovered, and caused to be patched, eleven zero-day exploits against Chrome, Safari, Microsoft Windows, and iOS. This seems to have been exploited by “Western government operatives actively conducting a counterterrorism operation”: The…
Everything You Ever Needed to Know About Social…
Companies are making big money on social media. And you can too. The trick to social media marketing is knowing the foundations of what makes it work so well. Making money for your business is…
UK organisations have faced 172,000 cyber attacks so…
UK organisations were subjected to almost 2,000 cyber attacks a day in the first quarter of 2021, according to a Beaming study. In a study of commercial Internet traffic, it discovered 172,079 cyber attacks against…
How to avoid social engineering scams
Cyber criminals have many tricks up their sleeves when it comes to compromising sensitive data. They don’t always rely on system vulnerabilities and sophisticated hacks; they’re just as likely to target an organisation’s employees. The…
Catches of the month: Phishing scams for April…
With the UK edging towards the end of lockdown, we are all eager to make plans and get the most out of our renewed freedom. But before you rush off to buy festival or theatre…
Phone Cloning Scam
A newspaper in Malaysia is reporting on a cell phone cloning scam. The scammer convinces the victim to lend them their cell phone, and the scammer quickly clones it. What’s clever about this scam is…