Google and Facebook Single Sign On (SSO)
Single Sign On (SSO) options are commonly seen through providers such as Google, Facebook and to a lesser extent Apple. There are also less …
Ransomware in Healthcare
The ThreatLabz 2024 Ransomware Report highlights the relative susceptibility of the healthcare industry to ransomware attacks. 312 attacks on the Healthcare industry were reported …
Bad Bots
Kindus has discussed the role of bots on the Internet and how webmasters can use ‘robots.txt’ to control them. Unfortunately many bots do not …
Lessons from the Cloudstrike Outage
On July 19, 2024 at 04:09 UTC, CrowdStrike released an update for ‘Falcon Sensor 7.11’ or above to Windows systems. This caused a system …
eCommerce Shop Scams
Data from Security Research Labs has revealed a China based fake shopping network that they have named ‘BogusBazaar.’ They claim that: ‘As of April …
Lockbit Ransomware Takedown
In February 2024 the UK National Crime Agency released details of how the NCA and other international policing agencies had disrupted the actions of …
UK Cyber security breaches survey 2024
Lies, damned lies, and statistics (attributed to Disraeli) The UK Cyber Security Breaches Survey 2024 was published on 9th April 2024. Not surprisingly it …
Digital Gift Card Issues
Both Apple and Google offer gift card services for use on their App stores. Just as it states on the tin the card can …
Biometric Security Hacks
Biometric security may not be the bulletproof security system that it appears to be. The theory is that information such as fingerprints or facial …
SMS Authentication Pitfalls
SMS is promoted as a reliable way to authenticate users. A message is sent to a mobile number with a one-time passcode (OTP) that …
Data Poisoning
Data Poisoning is an attempt to fool a system by inserting rogue data. It could be a threat to AI systems because they build …
Link Cloaking
In the ideal world every web page will be linked to a url that clearly and accurately describes the purpose of that page. Unfortunately …
Email Security
Email has been around since 1971 and still fulfills its basic purpose of sending a message between two computers. The concept of keeping any …
Weak Passwords
Recent studies show that easily guessed passwords are still in frequent use and that these passwords are not as obvious as they might appear. …
Disguised Phishing Links
The Cloudflare 2023 Phishing Threats Report highlights the tactic of indirectly linking to malware. This can involve the target receiving an email, text or …
IoT Device Vulnerabilities
Kindus has previously discussed how IoT devices have become targets for hacker attacks. The 2023 Microsoft Digital Defense Report highlights further issues caused by …
SIM Swapping
Our everyday activities have become increasingly reliant on mobile phone connectivity. Even where a phone is not directly involved in a transaction it may …
Cookie Theft
Cookie theft has been associated with the takeover of Facebook accounts by criminals based in Vietnam. In 2021 Google cited cookie theft for the …
3rd Party Security Breaches
In September 2023 it was announced that the Greater Manchester Police had suffered from a data hack exposing details used by the force’s security …
Can the Government Have Its Cake and Eat It? UK Online Safety Bill Is Live.
Kindus has discussed the progress of the UK Online Safety Bill before in March 2023 and September 2022. The law is designed to protect …