Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources

Technology

Kali Linux Gets New Desktop Environment & Undercover Theme

3rd December 20193rd December 2019 peterglock

As well as avoiding excessive body piercings and not wearing a hoodie, pen testers can be even more inconspicuous by pretending to use Windows…: […] The Kali undercover feature meanwhile […]

 Glock Takes Stock  Dark Reading, Technology

Should cyber-security be more chameleon, less rhino?

2nd December 20192nd December 2019 peterglock

I thought this was going to be about cyber deception (disclosure: I sell and support deception from Cymmetria), instead it’s some interesting ideas in this ramble through some cyber security […]

 Glock Takes Stock  Technology

SMS Replacement is Exposing Users to Text, Call Interception Thanks to Sloppy Telecos

29th November 201929th November 2019 peterglock

I’ve moved away from SMS or other network-based authentication methods and now use mostly Google Authenticator. Looks like that’s the way to go…: A standard used by phone carriers around […]

 Glock Takes Stock  AT&T, Be Aware, google, hackers, hacking, motherboard, ss7, Technology, Verizon

This Email Security Startup’s Stormed the Dutch Market – Can it do the Same in the UK?

28th November 201928th November 2019 peterglock

This sounds like the equivalent of having a friend looking over your shoulder whilst you’re doing your email….: Email – ZIVVER’s CEO Rick Goud would not be the first to emphasise – […]

 Uncategorised  Be Aware, Glock Takes Stock, Technology

European Cybersecurity Agency Publishes Report on Smart Car Security

27th November 201927th November 2019 peterglock

I already find my car too intelligent to totally trust as it can park itself, cruise on the motorway and knows when I’m sleepy. The thought of autonomous vehicles makes […]

 Uncategorised  Glock Takes Stock, Technology

Optus opens privacy can of worms with programmable voice play

22nd November 201922nd November 2019 peterglock

I start from the assumption that all of my communications are being listened to. After all, just because I’m paranoid doesn’t mean they’re not watching my every move. Seems I’m […]

 Uncategorised  Be Aware, Glock Takes Stock, privacy, Technology, ZDNET

Google outlines plans for mainline Linux kernel support in Android

20th November 201920th November 2019 peterglock

Want to understand why Android security can be a nightmare?…: It seems like Google is working hard to update and upstream the Linux kernel that sits at the heart of […]

 Uncategorised  Ars Technica, Glock Takes Stock, Tech, Technology

UAE may lift WhatsApp calls ban ‘soon’, says top cyber security official

7th November 20197th November 2019 peterglock

Does this mean that the UAE have found a way to monitor voice calls via WhatsApp?…: The UAE may lift the ban on WhatsApp calls soon, a top cyber security […]

 Uncategorised  Glock Takes Stock, Technology

10 Charts That Will Change Your Perspective Of AI In Security

4th November 20194th November 2019 peterglock

Most of these charts seem to indicate widespread adoption of AI for cybersecurity (at least in the U.S.). The cynic in me thinks that the ‘executives’ surveyed have trusted their […]

 Uncategorised  Glock Takes Stock, Technology

Mind-reading technology is everyone’s next big security nightmare

16th October 201916th October 2019 peterglock

Brain computer interfaces (BCI) are already here in the form of external (non-invasive) and internal (invasive) systems. Putting aside the risks from invasive surgery, do you want your data ‘out […]

 Uncategorised  Glock Takes Stock, Technology, ZDNET

Posts navigation

← Older posts

Recent Posts

  • ENISA launches security mapping tool
  • 7 in 10 Cameras Are Running Outdated Firmware
  • Cyber security takes its place alongside UK’s armed services
  • Smith & Wesson targeted in cyberattack, report says
  • Apple Explains Mysterious iPhone 11 Location Requests

    Archives

    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019

    Categories

    • 101
    • 2fa
    • a week in security
    • AB 846
    • AB 873
    • adware
    • AdwCleaner
    • agent smith
    • Akamai
    • ALICE
    • Amazon
    • Amazon Elastic Compute Cloud
    • amazon prime
    • amazon prime day 2019
    • amazon prime phishing
    • Amazon web services
    • Amazong
    • Android
    • android malware
    • android Q beta
    • AndroidQ
    • antitrust
    • anunak
    • app permissions
    • Apple
    • apps
    • Ars Technica
    • Articles
    • Artificial Intelligence
    • assistance fraud
    • AT&T
    • atm attacks
    • atm cash-out attacks
    • atm fraud
    • atm malware
    • Automation
    • Awareness
    • aws
    • Baby Boomers
    • backdoor
    • Banking
    • banking phish
    • barnaby jack
    • Be Aware
    • Beta
    • Big Data
    • biometrics
    • bitcoin
    • bitcoin generators
    • Biz & IT
    • black box attacks
    • blog series
    • BlueKeep
    • Brave
    • Brave browser
    • Breach
    • Brian Krebs
    • british airways
    • Bruce Schneier
    • bugs
    • bundler
    • bundleware
    • Business
    • c-level
    • c-suites
    • c0decalc
    • California Consumer Privacy Act
    • call detail records
    • Cambridge Analytica
    • Capital One
    • Capital One data breach
    • Capital One hack
    • carbanak
    • Carbon Black
    • cash generators
    • Cellular
    • China
    • China Chopper
    • chrome
    • CIOs
    • CISO
    • CISOs
    • Cloud security
    • Cloudflare
    • CNBC Technology
    • CNET
    • code injection
    • compromise
    • Cookies
    • credential stuffing
    • credit monitoring
    • crowdstrike
    • CSOs
    • cutlet maker
    • Cyber Attack
    • Cyber Insurance
    • Cyberattacks
    • Cyberlaw
    • cybersecurity
    • daniel regalado
    • Dark Reading
    • Darkode
    • data
    • data at rest
    • data breach
    • data breach settlement
    • Data breaches
    • Data Broker
    • data in transit
    • data leaks
    • Data privacy
    • data privacy laws
    • data privacy legislation
    • data protection
    • Data Security
    • Data Security and Privacy Insider
    • data-loss
    • ddos
    • Deception
    • def con
    • defrauding the elderly
    • Department of Homeland Security
    • Deutsche Welle
    • developer's corner
    • development
    • digital bill of rights
    • Digital Business
    • Disconnect
    • distraction fraud
    • DNS
    • DNS servers
    • DNS-changer
    • domain controller
    • doordash
    • drive by
    • drop box
    • DuckDuckGo
    • ease-of-use
    • eavesdropping
    • EC2
    • EDR platforms
    • EFF
    • EK
    • EKs
    • Elasticsearch
    • electron
    • Electronic Frontier Foundation
    • Electronic Privacy Information Center
    • elizabeth warren
    • email
    • emotet
    • encryption
    • end to end encryption
    • enterprise
    • Equifax
    • Equifax breach
    • eris
    • EU
    • european union
    • Events
    • exes
    • exploit kit
    • exploit kits
    • exploits
    • Extenbro
    • extension
    • extensions for financial services
    • FaceApp
    • Facebook
    • Facial Recognition
    • Fallout
    • family IT guy
    • FBI
    • federal data privacy law
    • federal data privacy legislation
    • Federal Trade Commission
    • fintech
    • Flight 17
    • fraud
    • fraud prevention
    • FTC
    • funding cybersecurity
    • Gaming & Culture
    • gate
    • GDPR
    • General Data Protection Regulation
    • generation X
    • Germany
    • Ghostery
    • Glock Takes Stock
    • godlua
    • google
    • Google Chrome
    • google home audio
    • government cybersecurity
    • Graham Cluely
    • greendispenser
    • GreenFlash Sundown
    • hack
    • hacking
    • health care
    • HHS
    • Hospitals
    • iam
    • IBM
    • ICO
    • identity access management
    • identity theft
    • incident response
    • India
    • Information Security
    • infosec
    • internet service provider
    • intuitive tech
    • Investment
    • IoT
    • iPhone
    • ironpython
    • IT Governance
    • jackpotting
    • jailbreak
    • JD Supra
    • JPEG
    • Kaspersky
    • kill chain
    • Krebs on Security
    • LastPass
    • lavabit
    • law enforcement
    • lawfare
    • lazarus group
    • local government
    • logical attacks
    • login credentials
    • Lord EK
    • Mac
    • MacOS
    • Magecart
    • Magento
    • Magnitude
    • Maine
    • Malaysian Airlines
    • malicious domains
    • malicious IPs
    • malicious websites
    • malvertising
    • malware
    • malware removal
    • malware-based attack
    • Malwarebytes
    • marcus hutchins
    • Mark Zuckerberg
    • metropolitan police
    • microsoft
    • mirai
    • Mobile
    • mobile menace monday
    • mobile security
    • motherboard
    • municipalities
    • nation-state attack
    • network world
    • News
    • Nexus
    • njRAT
    • office 365
    • older users
    • online privacy
    • openpgp
    • operation soft cell
    • Opinion
    • opsec
    • padpin
    • Paige Thompson
    • pale moon
    • parental monitoring
    • parental monitoring apps
    • passwords
    • patching
    • payment
    • Penetration testing
    • penetration testing tools
    • permissions
    • personal information
    • personally identifiable information
    • phishing
    • Phobos
    • PII
    • ploutus
    • plugins
    • Poison Ivy
    • police
    • Policy
    • PoliticoEU
    • pre-installed software
    • preempt
    • preemption
    • privacy
    • project zero
    • propublica
    • protonmail
    • Purism
    • Pwnie Express
    • QR Code
    • QR code scam
    • ransomware
    • RATs
    • regulation
    • remediation and prevention
    • reports
    • Research
    • Researcher's corner
    • Resource
    • RIG
    • right to access
    • Ring doorbell
    • robocalls
    • Root certificate
    • roundup
    • router
    • rules-based segmentation
    • Russia
    • russian disinformation
    • ryuk
    • Salesforce
    • scam
    • scams
    • scheduled tasks
    • Science
    • sdelete
    • secure delete
    • secure messaging
    • Security
    • security breach
    • security engineering
    • security executives
    • security solutions
    • security tools
    • Sen. Ron Wyden
    • settlement
    • shoe shine
    • shoulder surfing
    • Signal
    • sim swap
    • skimmer
    • skimmers
    • skype
    • slack
    • smart home
    • smart phones
    • smart TV
    • SMS
    • sniffer
    • Social engineering
    • social engineering attacks
    • social media
    • social purpose company
    • social security numbers
    • software liability
    • Spelevo
    • SpyEye
    • stalkerware
    • stimulator
    • stuxnet
    • suceful
    • Supply Chain
    • surveillance
    • survey
    • SWATting
    • targeted spear phishing
    • tax
    • Tech
    • Tech Republic
    • Technology
    • The Telegraph
    • Threat analysis
    • threat intelligence
    • Threatpost
    • trade
    • travel
    • travelling
    • trickbot
    • trojan
    • trojans
    • TrustWave
    • twitter
    • tyupkin
    • Uncategorised
    • Underminer
    • updates
    • url
    • US data privacy laws
    • US data privacy legislation
    • US Federal Trade Commission
    • US Senate Judiciary Committee
    • usenix
    • Vermont
    • virustotal
    • Vivaldi
    • VPN servers
    • VT
    • vulnerabilities
    • vulnerability
    • wannacry
    • wardriving
    • web skimmers
    • web threat
    • Web threats
    • Week in security
    • Whaling
    • WhatsApp
    • Wiper
    • wire
    • Wired
    • X-Force Red
    • xfs middleware
    • ZDNET
    • zero days
    • Zeus
    • zoom zero-day

    Get in touch

    Email: [email protected]


    View Glock Enterprises Ltd profile on Ariba Discovery

    Pages

    • Blog
    • Privacy Policy
    • Resources
      • White Paper: Building a Business Case for Cybersecurity Asset Management
      • White Paper: Internet Connected Storage
      • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
      • Whitepaper: Coping with a flood of Data Subject Access Requests
      • Whitepaper: Cyber Deception
    • Services
    • Welcome

    The Latest from Facebook

    Glock Enterprises Ltd

    2 months ago

    Glock Enterprises Ltd

    If you fancy 30 minutes of watching a bald guy talk about the 5 questions you need to ask... youtu.be/bpZI9EoFt5E ... See MoreSee Less

    CyberChess 2019

    youtu.be

    My presentation at Cyberchess 2019 in Riga, Latvia. Includes a live (very simple) hack demo of wifi networks.

    Video

    View on Facebook
    ·Share

    Share on FacebookShare on TwitterShare on Linked InShare by Email

    Proudly powered by WordPress | Theme: Moesia by aThemes