Are you a serial shredder or do you tend not to bother thinking about what personal data is thrown in the waste? Have you ever thought what a cybercriminal could do after simply going through your rubbish? Millions of people throw sensitive information away every single day and criminals are well aware of this treasure … More Dumpster diving is a filthy business
Golf clubs and cybercrime couldn’t really sound further apart, but when it comes to cybersecurity, businesses of all sizes are targets and their owners must never assume anything is completely watertight. Golf is, however, more associated with business, so when I was recently asked to investigate and test the cybersecurity of an independent UK golf club, I thought it sounded like an interesting experiment. Furthermore, the owner of the club claimed that I would “struggle” to hack them, as … More On course for a good hacking
While a lot of media coverage centers on how threat actors are becoming better at evading capture and generally deploy ever more sophisticated techniques, I wanted to tell a story where one criminal in particular was anything but sophisticated. Before I joined ESET, I spent 14 years working in the UK police force working predominantly … More Not all cybercriminals are sophisticated
If you try to purchase a new appliance these days, there is a good chance you will be guided toward the most up-to-date, state-of-the-art, smart appliances first. Whether you are in the market for a new dishwasher, fridge or even toaster, the chances are there is an internet-enabled device waiting to target you, but why … More Is your dishwasher trying to kill you?
Just how easy is it to conduct a SIM swap attack and what can the attacker do once they have taken control of your phone number? In short, it’s worryingly easy and the criminals can do a lot once they have the keys to the kingdom. We hear of SIM swapping – also known as … More I hacked my friend’s website after a SIM swap attack