Inspired by an insightful comment on LinkeDin from an SC 27 colleague on the other side of the world (thanks Lars!), I spent most of last week updating the SecAware security policy templates and ISO27k ISMS materials.The main change was to distinguish …
Microsoft Addresses Wi-Fi Hotspots Issues in Latest Update
Host devices might lose connection to the internet after client device connects
US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
Hao Kuo Chi illegally obtained iCloud credentials of 4700 victims
WordPress Updates More Than a Million Sites to Fix Critical Ninja Forms Vulnerability
The code injection vulnerability allowed attackers to call methods in various Ninja Forms classes
What’s the Value of a Key-Value Store?
Learn about the benefits and drawbacks of a key-value store: a data structure designed for storing and returning values associated with keys as unique identifiers.
Experts Discuss Next Steps in Trust, Privacy and Security
The complex interrelation between trust, privacy and cybersecurity was discussed by experts during Okta Forum 2022
UK Proposes Post-Brexit Data Laws to Boost Innovation
Proposals designed to unlock businesses’ ability to use data and clamp down on nuisance calls and cookie pop-ups
Cybersecurity Researchers Find Several Google Play Store Apps Stealing User Data
Most dangerous are spyware tools capable of stealing information from other apps’ notifications
Space Development Agency plans for ‘enduring’ satellite experimentation testbed
The initial solicitation will be for 10 satellites, the agency expects the program to provide an “enduring” test and experimentation capability.
NakedPages Phishing Toolkit is Now Available on Cybercrime Forums
The toolkit is reportedly fully automated and comes preloaded with more than 50 phishing templates and site projects