One man’s crisis is another man’s opportunity.

Hooded criminal, face in shadow

Society has always had its share of bad apples. Even now, in the midst of an unprecedented crisis all some people can see is the opportunity to take advantage of others. There’s been a huge uptick in all kinds of fraud, usually targeting people’s understandable anxieties about the virus or their own financial situation. Here’s what you … Continue reading One man’s crisis is another man’s opportunity.

Someone’s been breached…but I don’t know whom

Just got off the phone from our corporate card provider to reset my card after a fraud block. Their words: “a number of customer card details were copied from where they were used recently and are being used to make fraudulent transactions”. So presumably at least one of the promised Christmas POS malware attacks came … Continue reading Someone’s been breached…but I don’t know whom

Is the internet eating itself?

Have we reached peak internet? No, you cry, more things can still go online for more people more of the time. Yup. But how much of that time will those people spend defending themselves against digital threats, or recovering from the consequences, or wading through unsolicited messages, or drowning in advertising? The slightly duller version … Continue reading Is the internet eating itself?

What can we do about Cryptolocker?

“That’s criminal!” said my wife when I told her about Cryptolocker. Actually, all malware is criminal (Computer Misuse Act 1990, for the legal eagles), but Cryptolocker is particularly nasty, and currently running rampant. In case you haven’t heard of it, it’s malware which once running on your PC sets about encrypting your files; to get … Continue reading What can we do about Cryptolocker?

Security training or MDM – you choose

IT service desk culture is full of sarcastic problem descriptions – PICNIC, ID-ten-T, PEBCAK. All of them serve as reminders that the root cause of many issues is user error, not systems failure. This is particularly true in information security, a point I’ve covered more than once before. So why bring it up again? Because … Continue reading Security training or MDM – you choose