Press "Enter" to skip to content

Posts tagged as “Security”

Deep fake voice scams are the new phishing threat

While I’m on security, Protocol highlights the new use of deep fake audio for phishing attacks.    Fake bosses using fabricated audio to infiltrate the organization.    …

Is Ransomware slowing?

So.. is Ransomware down?     The Washington Post examines the possible head-fake that recent data might be presenting.     As recent tallies have shown a decline… have…

An MSP breached, taking down the UK’s NHS

Well, with a headline like this, I couldn’t miss it.  “UK NHS suffers outage after a cyberattack on the managed service provider.”     The MSP, Advanced,…

Let’s learn about protestware

I wanted to note this new trend – protestware.      What’s that?    Developers deliberately sabotage their own software libraries to protest — turning software into “protestware.”    …

CISA’s leader talks storytelling

The Washington Post reviews Jen Easterly’s first year as head of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency – and one of…

The struggle to replace Chinese tech in telecom

You may not remember, but I covered the directive to remove Chinese telecom equipment from carriers during the Trump administration.     And it’s not going smoothly…

Microsoft’s Macro reversal, again

And talking about Microsoft today, let’s follow up on that VBA macro auto-blocking.     After announcing it was on, then off, well. It’s back.     Today, the…