-
Automation is key to effective and efficient pentest reporting
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at PlexTrac. Thanks to the great team there for their support! Getting high-quality, actionable pentesting reports doesn’t have to take hours. In fact, automating your processes with PlexTrac enables building a report in as little as five minutes! Conquer time-consuming processes, reduce…
-
Car companies are collecting data on your sex life, and apparently you’re fine with that
PRIVACY PRIVACY It seems modern cars are gobbling up all kinds of data about their drivers including – astonishingly – details of their sex lives. Read More
-
6 Mitigation Strategies to Make the Most of Audit Results
PRIVACY PRIVACY Audits are valuable tools that help you to identify potential risks, inefficiencies, and gaps. Here’s how to make the most of your audit results. Read More
-
Elon Musk in Hot Water With FTC Over Twitter Privacy Issues
PRIVACY PRIVACY A new court filing from the US Department of Justice suggests the billionaire “may have jeopardized data privacy and security” at Twitter, now known as X Read More
-
Fake Signal and Telegram Apps in the Google Play Store
PRIVACY PRIVACY Google removed fake Signal and Telegram apps from its Play store. An app with the name Signal Plus Messenger was available on Play for nine months and had been downloaded from Play roughly 100 times before Google took it down last April after being tipped off by security firm ESET. It was also…
-
Getting ready for a post-quantum world
PRIVACY PRIVACY Quantum computers are changing the cryptography rules Under Data Encryption, the CISA Zero Trust Maturity Model v2.0 cites the criticality of “cryptographic agility” on the third (out of four) level of maturity. Cryptographic agility is the ability to change the underlying cryptographic algorithms in applications and communications channels. I believe this highlights the…
-
Lazarus Group Blamed For $53m Heist at CoinEx
PRIVACY PRIVACY North Korean actors have become prolific crypto-thieves Read More
-
Wake-Up Call as 3AM Ransomware Variant Is Discovered
PRIVACY PRIVACY Symantec says it was used in a failed LockBit attack Read More
-
Cloud CVEs Surge 200% in a Year
PRIVACY PRIVACY But IBM warns credential compromise is number one initial access vector Read More
-
RUOK Day – How to Get Help Online When You’re Not Feeling OK
PRIVACY PRIVACY I’m such a fan of RUOK? Day. Started in 2009, it’s an Australian non-profit suicide prevention that is all about having conversations with others to address social isolation and promote a sense of community. What I love the most, is that RUOK? Day has become quite an event on the Australian calendar. You’d…