Alter It’s harder to alter hardware than software, but much more rewarding for hackers & spies. 2 ways of executing such attacks: Manipulate devices in transit from factory to customer. Or seed in changes from the start of manufacture. China makes 75% of the world’s mobile phones & 90% of personal computers. Content is king…
Tag: attack
Gullible Cybercrime: why are remote workers more gullible? Because they’re alone (can’t discuss with others) & need information (to do their tasks). Hackers create elaborate scams & send emails posing as co-workers. During lockdown, such attacks have tripled. Under pressure to work quickly, home workers are more likely to click on links to malware &…
Attack Criminals are leveraging the pandemic to turbocharge cyber-attacks. New targets are bio-tech firms developing Covid-19 vaccines & Personal Protective Equipment (PPE) manufacturers. 5-fold increase in hack attempts against the World Health Organisation. In 2017, NATO put cyber on the same footing as land, air & sea defences, but we’re more vulnerable than ever. Mission…
Weaponisation How to make cities safe against the weaponisation of vehicles? Easy – the measures that make a city better also make it safer. Walk & cycle, rather than drive. City walls. Buildings with moats. Tight streets that resist traffic. Collapsible pavements that can’t bear heavy weights. The weaponization of vehicles shows we’re better off…
Anticipate Anticipate which type of business attacks you’ll get & from where. Theft of client or bank data. Fraud in client or employee systems. Losing critical information or system access. Focus on prevention, rather than detection Guessed the Word? Series 42 (3/8) [pic: analogicus]