Featured Post

Google and Apple Privacy Relaxations

Recent changes announced by Google and Apple will harvest data from users without their consent. The Google changes have been announced but are not …

Read post

Latest Posts

By Grayde Bowen | 13/01/2025

Google and Apple Privacy Relaxations

Recent changes announced by Google and Apple will harvest data from users without their consent. The Google changes have been announced but are not …

Read post

By Grayde Bowen | 06/01/2025

Scam Promotions on Facebook

Web adverts promoting questionable offers and schemes are old hat.  Facebook is no exception but unlike wholly dubious hosts or otherwise reliable sites depending …

Read post

By Grayde Bowen | 04/12/2024

Sitting Duck Attacks

The Sitting Duck attack revolves around taking control of a domain and then using it to distribute malware or as a source for phishing …

Read post

By Grayde Bowen | 25/11/2024

Developers Hit By Compromised Software Packages

A Typosquat campaign uses slight variations on well-known names to mislead a user to access a rogue rather than genuine asset.  It is well …

Read post

By Grayde Bowen | 18/11/2024

Data Privacy in Job Recruitment

The online job-market business model involves building up a bank of CVs and matching those with possible job vacancies.  Unlike an old school recruitment …

Read post

By Grayde Bowen | 11/11/2024

ChatGPT Fake Citations

Anyone undertaking research will want to back up their conclusions with citations as to where their source material came from.  It is assumed that …

Read post

By Grayde Bowen | 04/11/2024

UK Data (Use and Access) Bill

The Data (Use and Access) Bill had its first reading in the Lords on 23 October 2024.  This step is merely a formal introduction …

Read post

By Grayde Bowen | 28/10/2024

Zero-Day Attacks

In October 2024 Google Mandiant reported on 138 exploited vulnerabilities since 2023.  They concluded there had been an increase in the number and speed …

Read post

By Grayde Bowen | 21/10/2024

Smart TVs – Getting Smarter At Watching You

Kindus has described how connected devices harvest personal data and how that can be misused or breached either by the hosting  body or others …

Read post

By Grayde Bowen | 14/10/2024

SSL Certificate Renewal

SSL/TLS authentication is part of the encryption suite to ensure that a requester is who they say they are and to grant or refuse …

Read post

By Grayde Bowen | 07/10/2024

Back In Time For Business Continuity

Business Continuity is that part of Disaster Recovery ensuring that at least some part of a business keeps running following a computer outage.  Regardless …

Read post

By Grayde Bowen | 30/09/2024

The SPAM Bomb

The symptoms of a SPAM, email or subscription bomb attack are almost impossible to miss.  The victim will suddenly receive a very large volume …

Read post

By Grayde Bowen | 23/09/2024

OFCOM vs Scam Callers

OFCOM is the UK regulator of phone and Internet services.  They are responsible for ensuring these services are safe and effective.  Part of their …

Read post

By Grayde Bowen | 16/09/2024

NHS Federated Data Platform Progress

Those with long memories will recall the time and money spent by the UK NHS in the early years of this century to build …

Read post

By Grayde Bowen | 03/09/2024

Google and Facebook Single Sign On (SSO)

Single Sign On (SSO) options are commonly seen through providers such as Google, Facebook and to a lesser extent Apple.  There are also less …

Read post

By Grayde Bowen | 20/08/2024

Doxing

Doxing (or Doxxing) is the dropping of documents or information onto the Internet.  It is generally taken to mean the disclosing of information that …

Read post

By Grayde Bowen | 13/08/2024

Ransomware in Healthcare

The ThreatLabz 2024 Ransomware Report highlights the relative susceptibility of the healthcare industry to ransomware attacks.  312 attacks on the Healthcare industry were reported …

Read post

By Grayde Bowen | 05/08/2024

Surveillance Pricing

In July 2024 the US Federal Trade Commission issued orders to 8 companies seeking information about their possible use of Surveillance Pricing.  These orders …

Read post

By Grayde Bowen | 29/07/2024

Bad Bots

Kindus has discussed the role of bots on the Internet and how webmasters can use ‘robots.txt’ to control them.  Unfortunately many bots do not …

Read post

By Grayde Bowen | 22/07/2024

Lessons from the Cloudstrike Outage

On July 19, 2024 at 04:09 UTC, CrowdStrike released an update for ‘Falcon Sensor 7.11’ or above to Windows systems.  This caused a system …

Read post

13/01/2025

Google and Apple Privacy Relaxations

Read post

06/01/2025

Scam Promotions on Facebook

Read post

04/12/2024

Sitting Duck Attacks

Read post

25/11/2024

Developers Hit By Compromised Software Packages

Read post

18/11/2024

Data Privacy in Job Recruitment

Read post

11/11/2024

ChatGPT Fake Citations

Read post

04/11/2024

UK Data (Use and Access) Bill

Read post

28/10/2024

Zero-Day Attacks

Read post

21/10/2024

Smart TVs – Getting Smarter At Watching You

Read post

14/10/2024

SSL Certificate Renewal

Read post

07/10/2024

Back In Time For Business Continuity

Read post

30/09/2024

The SPAM Bomb

Read post

23/09/2024

OFCOM vs Scam Callers

Read post

16/09/2024

NHS Federated Data Platform Progress

Read post

03/09/2024

Google and Facebook Single Sign On (SSO)

Read post

20/08/2024

Doxing

Read post

13/08/2024

Ransomware in Healthcare

Read post

05/08/2024

Surveillance Pricing

Read post

29/07/2024

Bad Bots

Read post

22/07/2024

Lessons from the Cloudstrike Outage

Read post

17/07/2024

Blocking AI Web Crawlers

Read post

10/07/2024

UK Government 2024– All Change at the Top

Read post

19/06/2024

Apple Intelligence

Read post

05/06/2024

Shadow AI

Read post

13/05/2024

eCommerce Shop Scams

Read post

08/05/2024

Lockbit Ransomware Takedown

Read post

23/04/2024

UK Cyber security breaches survey 2024

Read post

15/04/2024

EU AI Legislation

Read post

08/04/2024

AI Washing

Read post

25/03/2024

Digital Gift Card Issues

Read post

13/03/2024

Push Notifications

Read post

05/03/2024

EU Digital Services Act Implications

Read post

26/02/2024

Biometric Security Hacks

Read post

19/02/2024

Web Browser Privacy

Read post

05/02/2024

SMS Authentication Pitfalls

Read post

29/01/2024

Data Poisoning

Read post

17/01/2024

Link Cloaking

Read post

09/01/2024

Email Security

Read post

03/01/2024

AI Coding Pitfalls

Read post

11/12/2023

Weak Passwords

Read post

04/12/2023

Disguised Phishing Links

Read post

27/11/2023

IoT Device Vulnerabilities

Read post

20/11/2023

Ad Blocking at the Office

Read post

13/11/2023

UK 2G/3G Switch Off

Read post

06/11/2023

SIM Swapping

Read post

30/10/2023

AI In The Office

Read post

23/10/2023

SIM Farms

Read post

16/10/2023

Voice Clone Scams

Read post

09/10/2023

Cookie Theft

Read post

02/10/2023

3rd Party Security Breaches

Read post

25/09/2023

Can the Government Have Its Cake and Eat It? UK Online Safety Bill Is Live.

Read post

18/09/2023

Smart Device Data Sharing

Read post

11/09/2023

Open Source Intelligence

Read post

30/08/2023

Copyright, Only For Humans?

Read post

22/08/2023

Attack Surface Management

Read post

14/08/2023

Kindus 100 Posts and Counting

Read post

07/08/2023

Shadow IT Guidance

Read post

31/07/2023

UK – Data Protection and Digital Information (No. 2) Bill

Read post

26/07/2023

Takedowns of Fraudulent Web Services

Read post

24/07/2023

EU Digital Markets Act

Read post

17/07/2023

AI Generated News

Read post

10/07/2023

Transparency And Cyber Attacks

Read post

03/07/2023

How Common Are Prosecutions For Data Breaches?

Read post

26/06/2023

Passkey Verification

Read post

19/06/2023

Fighting Fake Reviews

Read post

13/06/2023

UK Smart Device Security Law

Read post

08/06/2023

Smart Speaker Data Leaks

Read post

30/05/2023

Shoulder Surfing Mobile Device Fraud

Read post

03/05/2023

New UK Digital Markets Legislation

Read post

25/04/2023

TikTok Restrictions

Read post

18/04/2023

AI Generated Text – Security and Copyright

Read post
Palace of Westminster, Big Ben, and Westminster Bridge as seen from the south bank of the River Thames. Creative Commons

04/04/2023

WhatsApp Rules for the UK Government

Read post

28/03/2023

UK Online Safety Bill Progress

Read post

21/03/2023

Cyber Essentials 2023 Changes

Read post

07/03/2023

Reporting Cyber Incidents in the UK

Read post

28/02/2023

Protective Domain Name Service (PDNS)

Read post

21/02/2023

DMARC Email Protection

Read post

14/02/2023

Browser Vulnerabilities

Read post

07/02/2023

Password Manager Risks

Read post

31/01/2023

Protecting Networked Devices

Read post
Banknote - 50.000.000 Mark - Deutsches Reich - 25.07.1923 Public Domain

24/01/2023

PayPal Security Loophole

Read post

17/01/2023

AI Text Poses a New Risk from Scammers

Read post

10/01/2023

Evaluating the Threat from Quantum Computing

Read post

03/01/2023

Digital Advertising Fraud

Read post
FIFA World Cup trophy in Italy Creative Commons

06/12/2022

Qatar World Cup Cyber Attacks

Read post

28/11/2022

Twitter Blue

Read post
GNU License Graphical reconstruction of Mammut americanum based on bony structure and paleontological texts

22/11/2022

Mastodon Security

Read post

07/11/2022

Home Phones at Work?

Read post

31/10/2022

Social Media Workplace Risks

Read post

25/10/2022

WordPress Security Solutions

Read post

11/10/2022

The Case For Legitimate Hacking

Read post

03/10/2022

Tackling Data Mining

Read post

27/09/2022

Google Search Vulnerabilities

Read post

14/09/2022

Is CAPTCHA Redundant?

Read post

14/09/2022

Insider Threats

Read post

14/09/2022

Energy Costs Of Data Processing

Read post

14/09/2022

DTAC – Digital Technology For the NHS

Read post

14/09/2022

Password Theft

Read post

14/09/2022

Privileged Access Management

Read post

14/09/2022

Artificial Intelligence and Network Security

Read post

14/09/2022

Battling the Botnets

Read post

14/09/2022

Tracking Cryptocurrency Scams

Read post

14/09/2022

Changes to EU and UK NIS Cyber Security Legislation

Read post

14/09/2022

Cyber Threats to Agriculture

Read post

14/09/2022

Unifying Physical and Cyber Security

Read post

14/09/2022

Running a Successful Phishing Simulation

Read post

14/09/2022

Calculating the Cost of a Databreach

Read post

14/09/2022

Janet Updates Security Requirements

Read post

14/09/2022

The UK Online Safety Bill

Read post

14/09/2022

UK Register of Cyber Security Professionals?

Read post

14/09/2022

Reacting to Ransomware

Read post

14/09/2022

Ukrainian Cyber Threats

Read post

14/09/2022

Zero Trust Security

Read post

14/09/2022

Nation State Cyber Attacks

Read post

14/09/2022

Passwordless Authentication

Read post

14/09/2022

QR Code Scams

Read post

14/09/2022

Secure Data Deletion

Read post

14/09/2022

Stopping Stalkerware

Read post

14/09/2022

Rubber Duck Danger

Read post

14/09/2022

Who’s Looking At You

Read post

14/09/2022

COP26 and Computer Sustainability

Read post

14/09/2022

Location Data Privacy

Read post

14/09/2022

Shaken And Stirred

Read post

14/09/2022

EU ePrivacy Regulation 2021

Read post

14/09/2022

Bitcoin – The Hidden Costs

Read post

14/09/2022

Lateral Spear Phishing

Read post

14/09/2022

Desktop Sharing Woes

Read post

14/09/2022

The Walls Have Ears

Read post

14/09/2022

Vulnerability Management in the Age of Cyberattacks

Read post

14/09/2022

The Ransomware Task Force

Read post

14/09/2022

SMS Delivery Scams

Read post

14/09/2022

Cloud Outage Risk Mitigation

Read post

14/09/2022

The Risk Register

Read post

14/09/2022

The Impact of GDPR

Read post

14/09/2022

Mobile Device Management

Read post

14/09/2022

Bug Bounty Hacking

Read post

14/09/2022

Amazon S3 Security (Simple Storage Service)

Read post

14/09/2022

E-Signatures in Regulated Industries

Read post

14/09/2022

Lockdown Cybercrime Data In The UK

Read post

14/09/2022

Remote Working And Cybersecurity Risks In A Post COVID-19 World

Read post

14/09/2022

Are you delivering Information Security training and awareness effectively?

Read post

14/09/2022

COVID-19 Cyber Threat Awareness

Read post

14/09/2022

Increasing the UK’s cyber security capability

Read post

14/09/2022

Facebook hit with fresh privacy complaints

Read post

14/09/2022

Google fined for breaking GDPR rules

Read post

14/09/2022

The ongoing threat of ransomware

Read post

14/09/2022

Morrisons data leak – the implications

Read post

14/09/2022

Virgin Media – An Important Lesson

Read post

14/09/2022

The evolution of automation

Read post

14/09/2022

Blockchain in pharma

Read post

14/09/2022

The aftermath of GDPR

Read post

14/09/2022

Lessons in handling data disasters

Read post

14/09/2022

UK Cybercrime Statistics

Read post

14/09/2022

Computer Based Fraud

Read post

14/09/2022

Breaches of USA Medical Health Information

Read post
1 of 155
Prev
Next

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories