Featured Post

AI Harvesting Personal Data

A recent AI trend is the creation of personalised doll images. On the surface this is a fun spin off of AI although some …

Read post

Latest Posts

By Grayde Bowen | 25/10/2022

WordPress Security Solutions

A website is often the front door to a business yet if not kept under control is easily compromised. WordPress is the most popular …

Read post

By Grayde Bowen | 11/10/2022

The Case For Legitimate Hacking

CyberUp is a campaign dedicated to updating the UK 1990 Computer Misuse Act to reflect modern computer security systems and how they are protected …

Read post

By Grayde Bowen | 03/10/2022

Tackling Data Mining

Many of the free services that run through of the Internet work on the principle that you are willing to give up some personal …

Read post

By Grayde Bowen | 27/09/2022

Google Search Vulnerabilities

Dorking is a legal but specialised sub-set of Google searching Google dorks are keyword searches that look for specific website content rather than searching …

Read post

By Grayde Bowen | 14/09/2022

Is CAPTCHA Redundant?

Is CAPTCHA Redundant? Automated routines aim to prevent bots flooding websites with unwanted activity but also drive away regular users and are readily bypassed …

Read post

By Grayde Bowen | 14/09/2022

Insider Threats

Insider Threats Social media is being used to entice loyal employees to reveal sensitive data An insider threat assumes that someone within an organisation …

Read post

By Grayde Bowen | 14/09/2022

Energy Costs Of Data Processing

Energy Costs Of Data Processing The rapid increase in energy costs will impact on those relying on data storage and processing Data Processing is …

Read post

By Grayde Bowen | 14/09/2022

DTAC – Digital Technology For the NHS

Digital Technology Assessment Criteria DTAC is a set of standards that computer programs or digital equipment should pass to be considered for adoption within …

Read post

By Grayde Bowen | 14/09/2022

Password Theft

Password Theft Passwords and accounts may be initially harvested by phishing or spoof websites. This is only the beginning of a well-established trade network …

Read post

By Grayde Bowen | 14/09/2022

Privileged Access Management

Privileged Access Management Privileged Access Management (PAM) builds on the base IT Security concept that a user should have the minimum privileges to do …

Read post

By Grayde Bowen | 14/09/2022

Artificial Intelligence and Network Security

Artificial Intelligence and Network Security How can Network security systems learn to identify when network traffic deviates from ‘normal’? Artificial Intelligence (AI) and Machine …

Read post

By Grayde Bowen | 14/09/2022

Battling the Botnets

Battling the Botnets Harmful botnet traffic may be approaching 20% of Internet traffic Botnets are not necessarily a bad thing.  Consider a SIEM (Security …

Read post

By Grayde Bowen | 14/09/2022

Tracking Cryptocurrency Scams

Tracking Cryptocurrency Scams Scammers are demanding payment in cryprocurrency but the nature of Blockchains means these transcations can be traced. Bitcoin and other cryptocurrency …

Read post

By Grayde Bowen | 14/09/2022

Changes to EU and UK NIS Cyber Security Legislation

Changes to the Directive on Security of Network and Information Systems The European Parliament has agreed on the concept of a new security law, …

Read post

By Grayde Bowen | 14/09/2022

Cyber Threats to Agriculture

Cyber Threats to Agriculture As agriculture becomes more connected so does its vulnerability to cyber attacks Global agriculture has rapidly moved from human or …

Read post

By Grayde Bowen | 14/09/2022

Unifying Physical and Cyber Security

Unifying Physical and Cyber Security Data from physical security systems should not be seen as separate to that from network monitoring. A web search …

Read post

By Grayde Bowen | 14/09/2022

Running a Successful Phishing Simulation

Running a Successful Phishing Simulation Simulating a phishing attack can be part of staff security training and will increase awareness of genuine phishing threats. …

Read post

By Grayde Bowen | 14/09/2022

Calculating the Cost of a Databreach

Estimating the cost of data breaches. UK government studies aim to identify the financial costs of dealing with a data breach. The full financial …

Read post

By Grayde Bowen | 14/09/2022

Janet Updates Security Requirements

Janet Updates Security Requirements JANET (Joint Academic Network) is the computer network backbone used by UK Universities, Colleges and research centres. Updates have been …

Read post

By Grayde Bowen | 14/09/2022

The UK Online Safety Bill

The UK Online Safety Bill Privacy versus protection, weighing the legal and operational constraints. The UK Online Safety Bill received its first reading in …

Read post

23/04/2025

AI Harvesting Personal Data

Read post

22/04/2025

UK Cyber Security and Resilience Bill Policy Statement

Read post

02/04/2025

AI Job Applications

Read post

25/03/2025

UK Government Ransomware Payment Proposals

Read post

18/03/2025

Windows 10 Support To End

Read post

10/03/2025

Apple Advanced Data Protection in the UK

Read post

24/02/2025

AI Meeting Assistants

Read post

12/02/2025

AI Copyright Changes

Read post

03/02/2025

Smart Ring Security

Read post

27/01/2025

The UK Digital Markets, Competition and Consumers Act

Read post

22/01/2025

UK Digital Driving License

Read post

13/01/2025

Google and Apple Privacy Relaxations

Read post

06/01/2025

Scam Promotions on Facebook

Read post

04/12/2024

Sitting Duck Attacks

Read post

25/11/2024

Developers Hit By Compromised Software Packages

Read post

18/11/2024

Data Privacy in Job Recruitment

Read post

11/11/2024

ChatGPT Fake Citations

Read post

04/11/2024

UK Data (Use and Access) Bill

Read post

28/10/2024

Zero-Day Attacks

Read post

21/10/2024

Smart TVs – Getting Smarter At Watching You

Read post

14/10/2024

SSL Certificate Renewal

Read post

07/10/2024

Back In Time For Business Continuity

Read post

30/09/2024

The SPAM Bomb

Read post

23/09/2024

OFCOM vs Scam Callers

Read post

16/09/2024

NHS Federated Data Platform Progress

Read post

03/09/2024

Google and Facebook Single Sign On (SSO)

Read post

20/08/2024

Doxing

Read post

13/08/2024

Ransomware in Healthcare

Read post

05/08/2024

Surveillance Pricing

Read post

29/07/2024

Bad Bots

Read post

22/07/2024

Lessons from the Cloudstrike Outage

Read post

17/07/2024

Blocking AI Web Crawlers

Read post

10/07/2024

UK Government 2024– All Change at the Top

Read post

19/06/2024

Apple Intelligence

Read post

05/06/2024

Shadow AI

Read post

13/05/2024

eCommerce Shop Scams

Read post

08/05/2024

Lockbit Ransomware Takedown

Read post

23/04/2024

UK Cyber security breaches survey 2024

Read post

15/04/2024

EU AI Legislation

Read post

08/04/2024

AI Washing

Read post

25/03/2024

Digital Gift Card Issues

Read post

13/03/2024

Push Notifications

Read post

05/03/2024

EU Digital Services Act Implications

Read post

26/02/2024

Biometric Security Hacks

Read post

19/02/2024

Web Browser Privacy

Read post

05/02/2024

SMS Authentication Pitfalls

Read post

29/01/2024

Data Poisoning

Read post

17/01/2024

Link Cloaking

Read post

09/01/2024

Email Security

Read post

03/01/2024

AI Coding Pitfalls

Read post

11/12/2023

Weak Passwords

Read post

04/12/2023

Disguised Phishing Links

Read post

27/11/2023

IoT Device Vulnerabilities

Read post

20/11/2023

Ad Blocking at the Office

Read post

13/11/2023

UK 2G/3G Switch Off

Read post

06/11/2023

SIM Swapping

Read post

30/10/2023

AI In The Office

Read post

23/10/2023

SIM Farms

Read post

16/10/2023

Voice Clone Scams

Read post

09/10/2023

Cookie Theft

Read post

02/10/2023

3rd Party Security Breaches

Read post

25/09/2023

Can the Government Have Its Cake and Eat It? UK Online Safety Bill Is Live.

Read post

18/09/2023

Smart Device Data Sharing

Read post

11/09/2023

Open Source Intelligence

Read post

30/08/2023

Copyright, Only For Humans?

Read post

22/08/2023

Attack Surface Management

Read post

14/08/2023

Kindus 100 Posts and Counting

Read post

07/08/2023

Shadow IT Guidance

Read post

31/07/2023

UK – Data Protection and Digital Information (No. 2) Bill

Read post

26/07/2023

Takedowns of Fraudulent Web Services

Read post

24/07/2023

EU Digital Markets Act

Read post

17/07/2023

AI Generated News

Read post

10/07/2023

Transparency And Cyber Attacks

Read post

03/07/2023

How Common Are Prosecutions For Data Breaches?

Read post

26/06/2023

Passkey Verification

Read post

19/06/2023

Fighting Fake Reviews

Read post

13/06/2023

UK Smart Device Security Law

Read post

08/06/2023

Smart Speaker Data Leaks

Read post

30/05/2023

Shoulder Surfing Mobile Device Fraud

Read post

03/05/2023

New UK Digital Markets Legislation

Read post

25/04/2023

TikTok Restrictions

Read post

18/04/2023

AI Generated Text – Security and Copyright

Read post
Palace of Westminster, Big Ben, and Westminster Bridge as seen from the south bank of the River Thames. Creative Commons

04/04/2023

WhatsApp Rules for the UK Government

Read post

28/03/2023

UK Online Safety Bill Progress

Read post

21/03/2023

Cyber Essentials 2023 Changes

Read post

07/03/2023

Reporting Cyber Incidents in the UK

Read post

28/02/2023

Protective Domain Name Service (PDNS)

Read post

21/02/2023

DMARC Email Protection

Read post

14/02/2023

Browser Vulnerabilities

Read post

07/02/2023

Password Manager Risks

Read post

31/01/2023

Protecting Networked Devices

Read post
Banknote - 50.000.000 Mark - Deutsches Reich - 25.07.1923 Public Domain

24/01/2023

PayPal Security Loophole

Read post

17/01/2023

AI Text Poses a New Risk from Scammers

Read post

10/01/2023

Evaluating the Threat from Quantum Computing

Read post

03/01/2023

Digital Advertising Fraud

Read post
FIFA World Cup trophy in Italy Creative Commons

06/12/2022

Qatar World Cup Cyber Attacks

Read post

28/11/2022

Twitter Blue

Read post
GNU License Graphical reconstruction of Mammut americanum based on bony structure and paleontological texts

22/11/2022

Mastodon Security

Read post

07/11/2022

Home Phones at Work?

Read post

31/10/2022

Social Media Workplace Risks

Read post

25/10/2022

WordPress Security Solutions

Read post

11/10/2022

The Case For Legitimate Hacking

Read post

03/10/2022

Tackling Data Mining

Read post

27/09/2022

Google Search Vulnerabilities

Read post

14/09/2022

Is CAPTCHA Redundant?

Read post

14/09/2022

Insider Threats

Read post

14/09/2022

Energy Costs Of Data Processing

Read post

14/09/2022

DTAC – Digital Technology For the NHS

Read post

14/09/2022

Password Theft

Read post

14/09/2022

Privileged Access Management

Read post

14/09/2022

Artificial Intelligence and Network Security

Read post

14/09/2022

Battling the Botnets

Read post

14/09/2022

Tracking Cryptocurrency Scams

Read post

14/09/2022

Changes to EU and UK NIS Cyber Security Legislation

Read post

14/09/2022

Cyber Threats to Agriculture

Read post

14/09/2022

Unifying Physical and Cyber Security

Read post

14/09/2022

Running a Successful Phishing Simulation

Read post

14/09/2022

Calculating the Cost of a Databreach

Read post

14/09/2022

Janet Updates Security Requirements

Read post

14/09/2022

The UK Online Safety Bill

Read post

14/09/2022

UK Register of Cyber Security Professionals?

Read post

14/09/2022

Reacting to Ransomware

Read post

14/09/2022

Ukrainian Cyber Threats

Read post

14/09/2022

Zero Trust Security

Read post

14/09/2022

Nation State Cyber Attacks

Read post

14/09/2022

Passwordless Authentication

Read post

14/09/2022

QR Code Scams

Read post

14/09/2022

Secure Data Deletion

Read post

14/09/2022

Stopping Stalkerware

Read post

14/09/2022

Rubber Duck Danger

Read post

14/09/2022

Who’s Looking At You

Read post

14/09/2022

COP26 and Computer Sustainability

Read post

14/09/2022

Location Data Privacy

Read post

14/09/2022

Shaken And Stirred

Read post

14/09/2022

EU ePrivacy Regulation 2021

Read post

14/09/2022

Bitcoin – The Hidden Costs

Read post

14/09/2022

Lateral Spear Phishing

Read post

14/09/2022

Desktop Sharing Woes

Read post

14/09/2022

The Walls Have Ears

Read post

14/09/2022

Vulnerability Management in the Age of Cyberattacks

Read post

14/09/2022

The Ransomware Task Force

Read post

14/09/2022

SMS Delivery Scams

Read post

14/09/2022

Cloud Outage Risk Mitigation

Read post

14/09/2022

The Risk Register

Read post

14/09/2022

The Impact of GDPR

Read post

14/09/2022

Mobile Device Management

Read post

14/09/2022

Bug Bounty Hacking

Read post

14/09/2022

Amazon S3 Security (Simple Storage Service)

Read post

14/09/2022

E-Signatures in Regulated Industries

Read post

14/09/2022

Lockdown Cybercrime Data In The UK

Read post

14/09/2022

Remote Working And Cybersecurity Risks In A Post COVID-19 World

Read post

14/09/2022

Are you delivering Information Security training and awareness effectively?

Read post

14/09/2022

COVID-19 Cyber Threat Awareness

Read post

14/09/2022

Increasing the UK’s cyber security capability

Read post

14/09/2022

Facebook hit with fresh privacy complaints

Read post

14/09/2022

Google fined for breaking GDPR rules

Read post

14/09/2022

The ongoing threat of ransomware

Read post

14/09/2022

Morrisons data leak – the implications

Read post

14/09/2022

Virgin Media – An Important Lesson

Read post

14/09/2022

The evolution of automation

Read post

14/09/2022

Blockchain in pharma

Read post

14/09/2022

The aftermath of GDPR

Read post

14/09/2022

Lessons in handling data disasters

Read post

14/09/2022

UK Cybercrime Statistics

Read post

14/09/2022

Computer Based Fraud

Read post

14/09/2022

Breaches of USA Medical Health Information

Read post
1 of 166
Prev
Next

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories