Featured Post

eCommerce Shop Scams

Data from Security Research Labs has revealed a China based fake shopping network that they have named ‘BogusBazaar.’  They claim that: ‘As of April …

Read post

Latest Posts

By Grayde Bowen | 13/05/2024

eCommerce Shop Scams

Data from Security Research Labs has revealed a China based fake shopping network that they have named ‘BogusBazaar.’  They claim that: ‘As of April …

Read post

By Grayde Bowen | 08/05/2024

Lockbit Ransomware Takedown

In February 2024 the UK National Crime Agency released details of how the NCA and other international policing agencies had disrupted the actions of …

Read post

By Grayde Bowen | 23/04/2024

UK Cyber security breaches survey 2024

Lies, damned lies, and statistics (attributed to Disraeli) The UK Cyber Security Breaches Survey 2024 was published on 9th April 2024.  Not surprisingly it …

Read post

By Grayde Bowen | 15/04/2024

EU AI Legislation

The EU Artificial Intelligence Act became law from 13th March 2024.  In other countries: China has AI laws already in place that prohibit the …

Read post

By Grayde Bowen | 08/04/2024

AI Washing

Artificial Intelligence systems have become the buzz word in computing developments and product features.  AI washing refers to products taking advantage of the buzz …

Read post

By Grayde Bowen | 25/03/2024

Digital Gift Card Issues

Both Apple and Google offer gift card services for use on their App stores.  Just as it states on the tin the card can …

Read post

By Grayde Bowen | 13/03/2024

Push Notifications

Push Notifications are primarily seen as a marketing or advertising tool.   Another popular use is within chat applications; ensuring that subscribers keep up with …

Read post

By Grayde Bowen | 05/03/2024

EU Digital Services Act Implications

Kindus has already outlined the EU Digital Markets Act.  The Digital Services Act is another EU law that came into force on all platforms …

Read post

By Grayde Bowen | 26/02/2024

Biometric Security Hacks

Biometric security may not be the bulletproof security system that it appears to be.  The theory is that information such as fingerprints or facial …

Read post

By Grayde Bowen | 19/02/2024

Web Browser Privacy

Various services offer the concept of private browsing.  In most cases this means that browsing history is kept secret from other users of the …

Read post

By Grayde Bowen | 05/02/2024

SMS Authentication Pitfalls

SMS is promoted as a reliable way to authenticate users.  A message is sent to a mobile number with a one-time passcode (OTP) that …

Read post

By Grayde Bowen | 29/01/2024

Data Poisoning

Data Poisoning is an attempt to fool a system by inserting rogue data.  It could be a threat to AI systems because they build …

Read post

By Grayde Bowen | 17/01/2024

Link Cloaking

In the ideal world every web page will be linked to a url that clearly and accurately describes the purpose of that page.  Unfortunately …

Read post

By Grayde Bowen | 09/01/2024

Email Security

Email has been around since 1971 and still fulfills its basic purpose of sending a message between two computers.  The concept of keeping any …

Read post

By Grayde Bowen | 03/01/2024

AI Coding Pitfalls

The Feeling of Power is a 1958 Science Fiction short story by Isaac Asimov.  It proposes a world that relies on computers to construct …

Read post

By Grayde Bowen | 11/12/2023

Weak Passwords

Recent studies show that easily guessed passwords are still in frequent use and that these passwords are not as obvious as they might appear. …

Read post

By Grayde Bowen | 04/12/2023

Disguised Phishing Links

The Cloudflare 2023 Phishing Threats Report highlights the tactic of indirectly linking to malware.  This can involve the target receiving an email, text or …

Read post

By Grayde Bowen | 27/11/2023

IoT Device Vulnerabilities

Kindus has previously discussed how IoT devices have become targets for hacker attacks. The 2023 Microsoft Digital Defense Report highlights further issues caused by …

Read post

By Grayde Bowen | 20/11/2023

Ad Blocking at the Office

The vast majority of sites and services on the web are free to use.  Many of those are supported by advertising but that advertising …

Read post

By Grayde Bowen | 13/11/2023

UK 2G/3G Switch Off

UK Mobile Network operators have agreed to sunset (switch off) 2G and 3G by 2033.  The current situation is that 3G is being switched …

Read post

13/05/2024

eCommerce Shop Scams

Read post

08/05/2024

Lockbit Ransomware Takedown

Read post

23/04/2024

UK Cyber security breaches survey 2024

Read post

15/04/2024

EU AI Legislation

Read post

08/04/2024

AI Washing

Read post

25/03/2024

Digital Gift Card Issues

Read post

13/03/2024

Push Notifications

Read post

05/03/2024

EU Digital Services Act Implications

Read post

26/02/2024

Biometric Security Hacks

Read post

19/02/2024

Web Browser Privacy

Read post

05/02/2024

SMS Authentication Pitfalls

Read post

29/01/2024

Data Poisoning

Read post

17/01/2024

Link Cloaking

Read post

09/01/2024

Email Security

Read post

03/01/2024

AI Coding Pitfalls

Read post

11/12/2023

Weak Passwords

Read post

04/12/2023

Disguised Phishing Links

Read post

27/11/2023

IoT Device Vulnerabilities

Read post

20/11/2023

Ad Blocking at the Office

Read post

13/11/2023

UK 2G/3G Switch Off

Read post

06/11/2023

SIM Swapping

Read post

30/10/2023

AI In The Office

Read post

23/10/2023

SIM Farms

Read post

16/10/2023

Voice Clone Scams

Read post

09/10/2023

Cookie Theft

Read post

02/10/2023

3rd Party Security Breaches

Read post

25/09/2023

Can the Government Have Its Cake and Eat It? UK Online Safety Bill Is Live.

Read post

18/09/2023

Smart Device Data Sharing

Read post

11/09/2023

Open Source Intelligence

Read post

30/08/2023

Copyright, Only For Humans?

Read post

22/08/2023

Attack Surface Management

Read post

14/08/2023

Kindus 100 Posts and Counting

Read post

07/08/2023

Shadow IT Guidance

Read post

31/07/2023

UK – Data Protection and Digital Information (No. 2) Bill

Read post

26/07/2023

Takedowns of Fraudulent Web Services

Read post

24/07/2023

EU Digital Markets Act

Read post

17/07/2023

AI Generated News

Read post

10/07/2023

Transparency And Cyber Attacks

Read post

03/07/2023

How Common Are Prosecutions For Data Breaches?

Read post

26/06/2023

Passkey Verification

Read post

19/06/2023

Fighting Fake Reviews

Read post

13/06/2023

UK Smart Device Security Law

Read post

08/06/2023

Smart Speaker Data Leaks

Read post

30/05/2023

Shoulder Surfing Mobile Device Fraud

Read post

03/05/2023

New UK Digital Markets Legislation

Read post

25/04/2023

TikTok Restrictions

Read post

18/04/2023

AI Generated Text – Security and Copyright

Read post
Palace of Westminster, Big Ben, and Westminster Bridge as seen from the south bank of the River Thames. Creative Commons

04/04/2023

WhatsApp Rules for the UK Government

Read post

28/03/2023

UK Online Safety Bill Progress

Read post

21/03/2023

Cyber Essentials 2023 Changes

Read post

07/03/2023

Reporting Cyber Incidents in the UK

Read post

28/02/2023

Protective Domain Name Service (PDNS)

Read post

21/02/2023

DMARC Email Protection

Read post

14/02/2023

Browser Vulnerabilities

Read post

07/02/2023

Password Manager Risks

Read post

31/01/2023

Protecting Networked Devices

Read post
Banknote - 50.000.000 Mark - Deutsches Reich - 25.07.1923 Public Domain

24/01/2023

PayPal Security Loophole

Read post

17/01/2023

AI Text Poses a New Risk from Scammers

Read post

10/01/2023

Evaluating the Threat from Quantum Computing

Read post

03/01/2023

Digital Advertising Fraud

Read post
FIFA World Cup trophy in Italy Creative Commons

06/12/2022

Qatar World Cup Cyber Attacks

Read post

28/11/2022

Twitter Blue

Read post
GNU License Graphical reconstruction of Mammut americanum based on bony structure and paleontological texts

22/11/2022

Mastodon Security

Read post

07/11/2022

Home Phones at Work?

Read post

31/10/2022

Social Media Workplace Risks

Read post

25/10/2022

WordPress Security Solutions

Read post

11/10/2022

The Case For Legitimate Hacking

Read post

03/10/2022

Tackling Data Mining

Read post

27/09/2022

Google Search Vulnerabilities

Read post

14/09/2022

Is CAPTCHA Redundant?

Read post

14/09/2022

Insider Threats

Read post

14/09/2022

Energy Costs Of Data Processing

Read post

14/09/2022

DTAC – Digital Technology For the NHS

Read post

14/09/2022

Password Theft

Read post

14/09/2022

Privileged Access Management

Read post

14/09/2022

Artificial Intelligence and Network Security

Read post

14/09/2022

Battling the Botnets

Read post

14/09/2022

Tracking Cryptocurrency Scams

Read post

14/09/2022

Changes to EU and UK NIS Cyber Security Legislation

Read post

14/09/2022

Cyber Threats to Agriculture

Read post

14/09/2022

Unifying Physical and Cyber Security

Read post

14/09/2022

Running a Successful Phishing Simulation

Read post

14/09/2022

Calculating the Cost of a Databreach

Read post

14/09/2022

Janet Updates Security Requirements

Read post

14/09/2022

The UK Online Safety Bill

Read post

14/09/2022

UK Register of Cyber Security Professionals?

Read post

14/09/2022

Reacting to Ransomware

Read post

14/09/2022

Ukrainian Cyber Threats

Read post

14/09/2022

Zero Trust Security

Read post

14/09/2022

Nation State Cyber Attacks

Read post

14/09/2022

Passwordless Authentication

Read post

14/09/2022

QR Code Scams

Read post

14/09/2022

Secure Data Deletion

Read post

14/09/2022

Stopping Stalkerware

Read post

14/09/2022

Rubber Duck Danger

Read post

14/09/2022

Who’s Looking At You

Read post

14/09/2022

COP26 and Computer Sustainability

Read post

14/09/2022

Location Data Privacy

Read post

14/09/2022

Shaken And Stirred

Read post

14/09/2022

EU ePrivacy Regulation 2021

Read post

14/09/2022

Bitcoin – The Hidden Costs

Read post

14/09/2022

Lateral Spear Phishing

Read post

14/09/2022

Desktop Sharing Woes

Read post

14/09/2022

The Walls Have Ears

Read post

14/09/2022

Vulnerability Management in the Age of Cyberattacks

Read post

14/09/2022

The Ransomware Task Force

Read post

14/09/2022

SMS Delivery Scams

Read post

14/09/2022

Cloud Outage Risk Mitigation

Read post

14/09/2022

The Risk Register

Read post

14/09/2022

The Impact of GDPR

Read post

14/09/2022

Mobile Device Management

Read post

14/09/2022

Bug Bounty Hacking

Read post

14/09/2022

Amazon S3 Security (Simple Storage Service)

Read post

14/09/2022

E-Signatures in Regulated Industries

Read post

14/09/2022

Lockdown Cybercrime Data In The UK

Read post

14/09/2022

Remote Working And Cybersecurity Risks In A Post COVID-19 World

Read post

14/09/2022

Are you delivering Information Security training and awareness effectively?

Read post

14/09/2022

COVID-19 Cyber Threat Awareness

Read post

14/09/2022

Increasing the UK’s cyber security capability

Read post

14/09/2022

Facebook hit with fresh privacy complaints

Read post

14/09/2022

Google fined for breaking GDPR rules

Read post

14/09/2022

The ongoing threat of ransomware

Read post

14/09/2022

Morrisons data leak – the implications

Read post

14/09/2022

Virgin Media – An Important Lesson

Read post

14/09/2022

The evolution of automation

Read post

14/09/2022

Blockchain in pharma

Read post

14/09/2022

The aftermath of GDPR

Read post

14/09/2022

Lessons in handling data disasters

Read post

14/09/2022

UK Cybercrime Statistics

Read post

14/09/2022

Computer Based Fraud

Read post

14/09/2022

Breaches of USA Medical Health Information

Read post
1 of 131
Prev
Next

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories