Biometric Security Hacks
Biometric security may not be the bulletproof security system that it appears to be. The theory is that information such as fingerprints or facial …
SMS Authentication Pitfalls
SMS is promoted as a reliable way to authenticate users. A message is sent to a mobile number with a one-time passcode (OTP) that …
Data Poisoning
Data Poisoning is an attempt to fool a system by inserting rogue data. It could be a threat to AI systems because they build …
Link Cloaking
In the ideal world every web page will be linked to a url that clearly and accurately describes the purpose of that page. Unfortunately …
Email Security
Email has been around since 1971 and still fulfills its basic purpose of sending a message between two computers. The concept of keeping any …
Weak Passwords
Recent studies show that easily guessed passwords are still in frequent use and that these passwords are not as obvious as they might appear. …
Disguised Phishing Links
The Cloudflare 2023 Phishing Threats Report highlights the tactic of indirectly linking to malware. This can involve the target receiving an email, text or …
IoT Device Vulnerabilities
Kindus has previously discussed how IoT devices have become targets for hacker attacks. The 2023 Microsoft Digital Defense Report highlights further issues caused by …
SIM Swapping
Our everyday activities have become increasingly reliant on mobile phone connectivity. Even where a phone is not directly involved in a transaction it may …
Cookie Theft
Cookie theft has been associated with the takeover of Facebook accounts by criminals based in Vietnam. In 2021 Google cited cookie theft for the …
3rd Party Security Breaches
In September 2023 it was announced that the Greater Manchester Police had suffered from a data hack exposing details used by the force’s security …
Can the Government Have Its Cake and Eat It? UK Online Safety Bill Is Live.
Kindus has discussed the progress of the UK Online Safety Bill before in March 2023 and September 2022. The law is designed to protect …
Smart Device Data Sharing
The Register has summarised a Which report indicating that many Smart or IoT devices are harvesting data that is far from necessary for the …
Open Source Intelligence
Open Source Intelligence should not be confused with Open Source software although it can involve the use of Open Source tools. Instead it relates …
Attack Surface Management
The computing world is constantly throwing up new buzz words. Attack Surface Management is like many of these novel terms. It is not a …
Kindus 100 Posts and Counting
This is the 100th blog post on Kindus.co.uk, rest assured that none are AI generated but instead reflect the analysis and opinions of people …
Shadow IT Guidance
The UK NCSC has published guidance on identifying and controlling shadow or grey IT assets within corporations. Shadow IT refers to the use of …
UK – Data Protection and Digital Information (No. 2) Bill
Update, October 2024, this bill was dropped following the 2024 election. The Data Protection and Digital Information (No. 2) Bill is a UK Bill …
Takedowns of Fraudulent Web Services
The UK National Cyber Security Centre (NCSC) has released its report on the 6th year of its Active Cyber Defence Programme (ACD). This is …
Transparency And Cyber Attacks
It is impossible to estimate the proportion of data security incidents that occur but are not reported. We do have some idea of the …