Stay in the know with Periculo
Periculo News: Bryn in Vegas
Our Senior Consultant Bryn Trotter, ventured to Las Vegas and shares his most valuable insights from the Def Con convention.
?What is Def Con? It is an annual hacker convention held in Las Vegas, regarded as one of the world’s most prominent and well-known computer security conferences.?
- Sci-Fi influences Hacking and Hacking influences Sci-Fi: The event revealed a fascinating link between science fiction and the hacking world. An intriguing hour was dedicated to exploring how sci-fi influences hacking and vice versa. The concepts depicted in film and television often find their way into real-world events. The lines between fiction and reality blur, creating a mesmerising narrative.
- Homeland Security attends: The Department of Homeland Security (DHS) made a surprising appearance at Def Con. Given the typical tension between the hacking community and government bodies. The DHS wants to bridge the gap and foster collaboration with the community. Their Hack DHS program aims to establish a mutually beneficial relationship that encourages information exchange and enhances cybersecurity on a larger scale.
- Talks on AI and LLMs: A reality check when it comes to "AI" and Large Language Models (LLMs). While we might perceive models like ChatGPT as rational and reasonable entities due to their fluent responses, the truth is they're far from human-like cognition. These "AI" models, including LLMs, are essentially designed to predict the next words in a sentence – a predictive puzzle, not true intelligence. Think of them as regular language models on steroids, with the immense computational power to churn through colossal datasets. However, they often "hallucinate" responses and lack genuine reasoning, a stark reminder that our creations are still bound by their programming.
- Physical Security Secrets: When auditing physical security don't just focus on the obvious; consider the silent players like IoT devices (yes, even printers!). The admin set-up during the initial boot sets the authentication mechanism for various printer-style devices. Surprisingly, this means a potential backdoor for the savvy hacker to bypass authentication and gain remote access. Let's remember to inspect and secure all admin accounts across IoT devices to keep us safe.
Other Big News: Cyberline
What is Cyberline by Periculo
We are thrilled to announce the launch of Cyberline, now your tool to help you understand and give you guidance if you suspect you're?dealing with a phishing threat.
- Register for our FREE QR Code sticker.
- Stick the QR code on your desk, diary or laptop.
- When you suspect a phishing attempt, you'll simply scan our QR code and follow our guidance.
Security Tip For Your Organisation
Do you regularly review app permissions?
Regularly review the permissions granted to apps on your devices. Some apps may ask for more permissions than necessary, potentially compromising your privacy. Only grant permissions that are essential for the app's functionality.
Consequences of Not Reviewing App Permissions:
- Privacy Breaches: Unauthorised data sharing.
- Data Exploitation: Targeted ads, data sales.
- Security Vulnerabilities: Device compromise.
- Identity Theft: Risk of fraud.
- Intrusive Tracking: Loss of privacy.
Fake Traffic Jams!
A Dutch artist "hacked" Google Maps by putting a cart full of smartphones on a wagon and walking through the city, creating virtual traffic jams that led drivers to take alternate routes.
A Simple and Effective SaaS Tool
The best way to manage your ISMS. Harpe is an instant security management system that enables you to meet all the requirements of ISO 27001.
For more information about cybersecurity or to simply find out about our services, Please do get in touch.?