Today, I’m having some work done on my car – nothing major, just a repair to a windscreen chip I picked up whilst out driving the other day. But having this work done, made me think about ...
In this final Easter egg themed post, I’ll explore the world of the computer Easter Egg. The world of IT and software development has embraced the concept of the Easter egg with open arms and ma...
In my 2nd post about Easter eggs, I’m taking a look at the world of vinyl eggs – secrets hidden away in music. I’ve always been a music fan, and one of the things that I miss with th...
Easter Eggs aren’t always a tasty chocolate surprise left by a rabbit* – Rather, they are hidden items left by creators, artists, and craftsmen for others to (hopefully) find and get enjoy...
Yesterday I posted about the seizure and take down of the Genesis Market website. As this was quite early in the day when I uploaded my post, a number of reports surfaced throughout the day, which I&#...
The FBI, working with multiple other law enforcement agencies have have seized and closed down a website which acted as a place for individuals to buy and sell data that would let them impersonate leg...
SIM swapping is a process whereby scammers convince mobile phone operators that they are you and that you want to move your number to a new device. Also known as a port-out scam, SIM splitti...
Ever keen to earn a quid buck from a situation, cyber criminals are now starting to use the spectre of ransomware attacks in an attempt to extort monies with fake ransom requests. Midnight cowboys The...
A new malware strain is targeting Android devices, and is capable of complete account takeover. Branded Nexus, the malware is a banking app trojan and has been available to threat actors since the mid...
A few days after Russia’s invasion of Ukraine (24/02/22), thousands of secret files were leaked to the German newspaper Süddeutsche Zeitung. The files were form a Russian company called NTC...