Are Cyber Criminals Hiding in your Office365 Right now?
A few weeks ago, a local company approached us because they had parted ways with their IT provider. The new company owner was very switched on but had just fallen victim to a £100,000 cybercrime hoax. You see cybercriminals had managed to gain hold of his accounts personnel Office365 credentials and sneak into his systems […]
Tech Tip – Windows 11 – Connect With Anyone Using The Chat Icon
Windows 11 has Microsoft Teams as a pre-installed app that users can access from the Taskbar by clicking the ‘Chat’ icon. To connect with anyone, if they’re on iOS, Android or Mac, here’s how: – Click on the Chat icon in Windows 11 Taskbar and click on the Get started button. – Confirm the Microsoft […]
Tech Tip – Create And Share A Form Using Google Forms
For occasions where you need to create surveys, quizzes, or get other quick and easy responses, you may not have tried Google Forms. Here’s to use them: – Go to forms.google.com and sign-in with your Google login. – Select the type of form you need from the gallery (Blank, Event Registration, Contact Information, RSVP, and […]
Security Stop-Press : Phish Kits That Can Beat Multi-Factor Authentication
Enterprise security company, Proofpoint, has warned that cyber criminals have found a way to beat multi-factor authentication by using phish kits. The kits leverage transparent reverse proxy, enabling them to man-in-the-middle (MitM) a browser session, steal the multi-factor authentication tokens, and bypass this trusted layer of security.
Tech Insight : Some Unmissable Chrome Extensions
In this tech insight, we look at what Chrome extensions are and how to access them, then we look at 10 examples of popular and useful Chrome extensions. What Are Chrome Extensions? Extensions for Google’s Chrome browser are software programs, built using technologies like HTML, CSS, and JavaScript that give Chrome more functionality and enable […]
Featured Article : What Are Disposable Emails?
In this article, we look at what disposable email addresses are, their benefits and disadvantages, and we look at a few examples of disposable email address services. What Are Disposable Email Addresses? Disposable / temporary email addresses (DEA), also known as ‘burner’ email addresses, are (mostly free) services that allow the user to set up […]
Tech News : Windows Updates Can Take 8 Hours
According to new research by a Microsoft program manager, it could take as long as 8 hours, connected to the Internet, for devices to fully download Microsoft updates. The Update Challenge – Time A blog post in Microsoft’s Tech Community by program manager David Guyer, highlighted how one important challenge for Microsoft is trying to […]
Tech News : European Oil Facilities Targeted By Cyber Attacks
In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware, […]
Tech News : 30% Rise In Crypto-Laundering
A report by blockchain data platform ‘Chainalysis’ has shown a 30 per cent increase in cryptocurrency being used for money laundering in 2021 compared to the previous year. $8.6 Billion The 2022 Crypto Crime Report noted how cybercriminals laundered a massive $8.6 billion worth of cryptocurrency in 2021. The figure was arrived at by compiling […]
Featured Article : Study Shows No-One Is Immune From Phishing
A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the […]