Threat landscape for industrial automation systems, H2 2021

By 2021 everyone got used to pandemic limitations – industrial organization employees and IT security professionals and threat actors. If we compare the numbers from 2020 and 2021, we see that 2021 looks more stable, particularly in H2. Continue reading Threat landscape for industrial automation systems, H2 2021

Most Secure ways to to authorize clients on their devices that are remotely connected by (AnyDesk, TeamViewer, etc…) without knowing the password

My case is I’m designing an app based on chromium browser powered by Electron .
And I need sometimes to log the clients in with some web apps. The password is only visible as dots in browsers by default.
I will have access to their compute… Continue reading Most Secure ways to to authorize clients on their devices that are remotely connected by (AnyDesk, TeamViewer, etc…) without knowing the password

How seriously should we take this commentary from John McAfee? If it’s serious, what do we do? [closed]

This question refers to this YouTube video of John McAfee
Because videos can disappear, I’ve provided a screenshot and transcript (transcribed by me, so please forgive errors)
What John is saying sounds pretty serious, but to what degree i… Continue reading How seriously should we take this commentary from John McAfee? If it’s serious, what do we do? [closed]

I think my Bluetooth Keyboard has a keylogger, how can I tell, and can I remove it?

I have a Redragon K530, and I’ve noticed that it periodically uses a massive amount of bandwidth and completely saturates my bluetooth dongle. It’s very annoying because other devices connected at the time become inoperable when this happe… Continue reading I think my Bluetooth Keyboard has a keylogger, how can I tell, and can I remove it?