Featured Post

AI Harvesting Personal Data

A recent AI trend is the creation of personalised doll images. On the surface this is a fun spin off of AI although some …

Read post

Latest Posts

By Grayde Bowen | 14/09/2022

UK Register of Cyber Security Professionals?

UK Plans to Create a Register of Cyber Security Professionals The UK is considering chartered Cyber Security professional status. Top professionals will be registered …

Read post

By Grayde Bowen | 14/09/2022

Reacting to Ransomware

Reacting to Ransomware Ransomware continues to be a major threat to computer systems. Attacks on high profile users make the news headlines but there …

Read post

By Grayde Bowen | 14/09/2022

Ukrainian Cyber Threats

Ukrainian Cyber Threats The current (March 2022) conflict between Ukraine and Russia is expanding into cyberspace and may affect computer systems Worldwide Politically motivated attacks …

Read post

By Grayde Bowen | 14/09/2022

Zero Trust Security

Zero Trust Security Zero Trust is not a single off the shelf solution.  It is best thought of a buzzword that describes a strategy …

Read post

By Grayde Bowen | 14/09/2022

Nation State Cyber Attacks

Nation State Cyber Attacks No target is too insignificant for the big player hackers. Compared to the costs of conventional weapons; cyber is a …

Read post

By Grayde Bowen | 14/09/2022

Passwordless Authentication

Passwordless Authentication The need to remember and input passwords to access data may be coming to an end Passwords are a core issue in …

Read post

By Grayde Bowen | 14/09/2022

QR Code Scams

QR Code Scams Mobile phones may open QR codes without checking if the content can be trusted. QR codes seemed to be going out …

Read post

By Grayde Bowen | 14/09/2022

Secure Data Deletion

Secure Data Deletion Deletion or overwriting is no longer a good enough solution to erase data from a computer In October 2021 Wired magazine …

Read post

By Grayde Bowen | 14/09/2022

Stopping Stalkerware

Stopping Stalkerware Stalkerware has grown out of applications designed to allow parents and guardians to monitor their children’s activity and theoretically prevent them from …

Read post

By Grayde Bowen | 14/09/2022

Rubber Duck Danger

Rubber Duck Danger USB drives have provided a challenge to network administrators for many years. Despite the growth in cloud storage, WiFi and cellular …

Read post

By Grayde Bowen | 14/09/2022

Who’s Looking At You

Who’s Looking At You As facial recognition software has become more reliable it is entering that grey area between personal security and personal privacy. …

Read post

By Grayde Bowen | 14/09/2022

COP26 and Computer Sustainability

COP26 and Computer Sustainability COP26 ran in Glasgow from 31st October to 12th November. The conference was attended by World leaders and delegates discussed …

Read post

By Grayde Bowen | 14/09/2022

Location Data Privacy

Location Data Privacy Accurate information on population movement has become a marketable commodity and this has encouraged some shady practices amongst mobile app developers …

Read post

By Grayde Bowen | 14/09/2022

Shaken And Stirred

Shaken and Stirred The plan to block scam phone calls Hacks and scams often depend on gaining the trust of the mark. This is …

Read post

By Grayde Bowen | 14/09/2022

EU ePrivacy Regulation 2021

EU ePrivacy Regulation 2021 With a ‘cover’ date of 2021 the ePrivacy Regulation was originally expected to be in force from 2018 to compliment …

Read post

By Grayde Bowen | 14/09/2022

Bitcoin – The Hidden Costs

Bitcoin – The Hidden Costs On 7th September 2021 El Salvador recognised Bitcoin as its legal currency (together with the US$) but what are …

Read post

By Grayde Bowen | 14/09/2022

Lateral Spear Phishing

Lateral Spear Phishing A phishing email that comes from a recognised business contact is more likely to be opened than random spam. Phishing emails …

Read post

By Grayde Bowen | 14/09/2022

Desktop Sharing Woes

Desktop Sharing Woes Following on from Kindus’ blog on the unsecured risks of remote meetings it is time to consider the perils of sharing …

Read post

By Grayde Bowen | 14/09/2022

The Walls Have Ears

Homeworkers Beware – The Walls Have Ears During World War 2 the British government put up a range of posters on the theme of …

Read post

By gabe | 14/09/2022

Vulnerability Management in the Age of Cyberattacks

For a twenty-first-century business, vulnerability management has become an essential part of day-to-day operations. Every application you use has vulnerabilities. Cybercriminals use these weaknesses …

Read post

23/04/2025

AI Harvesting Personal Data

Read post

22/04/2025

UK Cyber Security and Resilience Bill Policy Statement

Read post

02/04/2025

AI Job Applications

Read post

25/03/2025

UK Government Ransomware Payment Proposals

Read post

18/03/2025

Windows 10 Support To End

Read post

10/03/2025

Apple Advanced Data Protection in the UK

Read post

24/02/2025

AI Meeting Assistants

Read post

12/02/2025

AI Copyright Changes

Read post

03/02/2025

Smart Ring Security

Read post

27/01/2025

The UK Digital Markets, Competition and Consumers Act

Read post

22/01/2025

UK Digital Driving License

Read post

13/01/2025

Google and Apple Privacy Relaxations

Read post

06/01/2025

Scam Promotions on Facebook

Read post

04/12/2024

Sitting Duck Attacks

Read post

25/11/2024

Developers Hit By Compromised Software Packages

Read post

18/11/2024

Data Privacy in Job Recruitment

Read post

11/11/2024

ChatGPT Fake Citations

Read post

04/11/2024

UK Data (Use and Access) Bill

Read post

28/10/2024

Zero-Day Attacks

Read post

21/10/2024

Smart TVs – Getting Smarter At Watching You

Read post

14/10/2024

SSL Certificate Renewal

Read post

07/10/2024

Back In Time For Business Continuity

Read post

30/09/2024

The SPAM Bomb

Read post

23/09/2024

OFCOM vs Scam Callers

Read post

16/09/2024

NHS Federated Data Platform Progress

Read post

03/09/2024

Google and Facebook Single Sign On (SSO)

Read post

20/08/2024

Doxing

Read post

13/08/2024

Ransomware in Healthcare

Read post

05/08/2024

Surveillance Pricing

Read post

29/07/2024

Bad Bots

Read post

22/07/2024

Lessons from the Cloudstrike Outage

Read post

17/07/2024

Blocking AI Web Crawlers

Read post

10/07/2024

UK Government 2024– All Change at the Top

Read post

19/06/2024

Apple Intelligence

Read post

05/06/2024

Shadow AI

Read post

13/05/2024

eCommerce Shop Scams

Read post

08/05/2024

Lockbit Ransomware Takedown

Read post

23/04/2024

UK Cyber security breaches survey 2024

Read post

15/04/2024

EU AI Legislation

Read post

08/04/2024

AI Washing

Read post

25/03/2024

Digital Gift Card Issues

Read post

13/03/2024

Push Notifications

Read post

05/03/2024

EU Digital Services Act Implications

Read post

26/02/2024

Biometric Security Hacks

Read post

19/02/2024

Web Browser Privacy

Read post

05/02/2024

SMS Authentication Pitfalls

Read post

29/01/2024

Data Poisoning

Read post

17/01/2024

Link Cloaking

Read post

09/01/2024

Email Security

Read post

03/01/2024

AI Coding Pitfalls

Read post

11/12/2023

Weak Passwords

Read post

04/12/2023

Disguised Phishing Links

Read post

27/11/2023

IoT Device Vulnerabilities

Read post

20/11/2023

Ad Blocking at the Office

Read post

13/11/2023

UK 2G/3G Switch Off

Read post

06/11/2023

SIM Swapping

Read post

30/10/2023

AI In The Office

Read post

23/10/2023

SIM Farms

Read post

16/10/2023

Voice Clone Scams

Read post

09/10/2023

Cookie Theft

Read post

02/10/2023

3rd Party Security Breaches

Read post

25/09/2023

Can the Government Have Its Cake and Eat It? UK Online Safety Bill Is Live.

Read post

18/09/2023

Smart Device Data Sharing

Read post

11/09/2023

Open Source Intelligence

Read post

30/08/2023

Copyright, Only For Humans?

Read post

22/08/2023

Attack Surface Management

Read post

14/08/2023

Kindus 100 Posts and Counting

Read post

07/08/2023

Shadow IT Guidance

Read post

31/07/2023

UK – Data Protection and Digital Information (No. 2) Bill

Read post

26/07/2023

Takedowns of Fraudulent Web Services

Read post

24/07/2023

EU Digital Markets Act

Read post

17/07/2023

AI Generated News

Read post

10/07/2023

Transparency And Cyber Attacks

Read post

03/07/2023

How Common Are Prosecutions For Data Breaches?

Read post

26/06/2023

Passkey Verification

Read post

19/06/2023

Fighting Fake Reviews

Read post

13/06/2023

UK Smart Device Security Law

Read post

08/06/2023

Smart Speaker Data Leaks

Read post

30/05/2023

Shoulder Surfing Mobile Device Fraud

Read post

03/05/2023

New UK Digital Markets Legislation

Read post

25/04/2023

TikTok Restrictions

Read post

18/04/2023

AI Generated Text – Security and Copyright

Read post
Palace of Westminster, Big Ben, and Westminster Bridge as seen from the south bank of the River Thames. Creative Commons

04/04/2023

WhatsApp Rules for the UK Government

Read post

28/03/2023

UK Online Safety Bill Progress

Read post

21/03/2023

Cyber Essentials 2023 Changes

Read post

07/03/2023

Reporting Cyber Incidents in the UK

Read post

28/02/2023

Protective Domain Name Service (PDNS)

Read post

21/02/2023

DMARC Email Protection

Read post

14/02/2023

Browser Vulnerabilities

Read post

07/02/2023

Password Manager Risks

Read post

31/01/2023

Protecting Networked Devices

Read post
Banknote - 50.000.000 Mark - Deutsches Reich - 25.07.1923 Public Domain

24/01/2023

PayPal Security Loophole

Read post

17/01/2023

AI Text Poses a New Risk from Scammers

Read post

10/01/2023

Evaluating the Threat from Quantum Computing

Read post

03/01/2023

Digital Advertising Fraud

Read post
FIFA World Cup trophy in Italy Creative Commons

06/12/2022

Qatar World Cup Cyber Attacks

Read post

28/11/2022

Twitter Blue

Read post
GNU License Graphical reconstruction of Mammut americanum based on bony structure and paleontological texts

22/11/2022

Mastodon Security

Read post

07/11/2022

Home Phones at Work?

Read post

31/10/2022

Social Media Workplace Risks

Read post

25/10/2022

WordPress Security Solutions

Read post

11/10/2022

The Case For Legitimate Hacking

Read post

03/10/2022

Tackling Data Mining

Read post

27/09/2022

Google Search Vulnerabilities

Read post

14/09/2022

Is CAPTCHA Redundant?

Read post

14/09/2022

Insider Threats

Read post

14/09/2022

Energy Costs Of Data Processing

Read post

14/09/2022

DTAC – Digital Technology For the NHS

Read post

14/09/2022

Password Theft

Read post

14/09/2022

Privileged Access Management

Read post

14/09/2022

Artificial Intelligence and Network Security

Read post

14/09/2022

Battling the Botnets

Read post

14/09/2022

Tracking Cryptocurrency Scams

Read post

14/09/2022

Changes to EU and UK NIS Cyber Security Legislation

Read post

14/09/2022

Cyber Threats to Agriculture

Read post

14/09/2022

Unifying Physical and Cyber Security

Read post

14/09/2022

Running a Successful Phishing Simulation

Read post

14/09/2022

Calculating the Cost of a Databreach

Read post

14/09/2022

Janet Updates Security Requirements

Read post

14/09/2022

The UK Online Safety Bill

Read post

14/09/2022

UK Register of Cyber Security Professionals?

Read post

14/09/2022

Reacting to Ransomware

Read post

14/09/2022

Ukrainian Cyber Threats

Read post

14/09/2022

Zero Trust Security

Read post

14/09/2022

Nation State Cyber Attacks

Read post

14/09/2022

Passwordless Authentication

Read post

14/09/2022

QR Code Scams

Read post

14/09/2022

Secure Data Deletion

Read post

14/09/2022

Stopping Stalkerware

Read post

14/09/2022

Rubber Duck Danger

Read post

14/09/2022

Who’s Looking At You

Read post

14/09/2022

COP26 and Computer Sustainability

Read post

14/09/2022

Location Data Privacy

Read post

14/09/2022

Shaken And Stirred

Read post

14/09/2022

EU ePrivacy Regulation 2021

Read post

14/09/2022

Bitcoin – The Hidden Costs

Read post

14/09/2022

Lateral Spear Phishing

Read post

14/09/2022

Desktop Sharing Woes

Read post

14/09/2022

The Walls Have Ears

Read post

14/09/2022

Vulnerability Management in the Age of Cyberattacks

Read post

14/09/2022

The Ransomware Task Force

Read post

14/09/2022

SMS Delivery Scams

Read post

14/09/2022

Cloud Outage Risk Mitigation

Read post

14/09/2022

The Risk Register

Read post

14/09/2022

The Impact of GDPR

Read post

14/09/2022

Mobile Device Management

Read post

14/09/2022

Bug Bounty Hacking

Read post

14/09/2022

Amazon S3 Security (Simple Storage Service)

Read post

14/09/2022

E-Signatures in Regulated Industries

Read post

14/09/2022

Lockdown Cybercrime Data In The UK

Read post

14/09/2022

Remote Working And Cybersecurity Risks In A Post COVID-19 World

Read post

14/09/2022

Are you delivering Information Security training and awareness effectively?

Read post

14/09/2022

COVID-19 Cyber Threat Awareness

Read post

14/09/2022

Increasing the UK’s cyber security capability

Read post

14/09/2022

Facebook hit with fresh privacy complaints

Read post

14/09/2022

Google fined for breaking GDPR rules

Read post

14/09/2022

The ongoing threat of ransomware

Read post

14/09/2022

Morrisons data leak – the implications

Read post

14/09/2022

Virgin Media – An Important Lesson

Read post

14/09/2022

The evolution of automation

Read post

14/09/2022

Blockchain in pharma

Read post

14/09/2022

The aftermath of GDPR

Read post

14/09/2022

Lessons in handling data disasters

Read post

14/09/2022

UK Cybercrime Statistics

Read post

14/09/2022

Computer Based Fraud

Read post

14/09/2022

Breaches of USA Medical Health Information

Read post
1 of 166
Prev
Next

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories