Get the GMA Blog delivered straight to your inbox
Recent News Items
-
Booking.com Breach Highlights Rise In Reservation Hijack Scams
Booking.com has reported a data breach involving customer reservation details, and the exposed data is already being used to carry out highly convincing “reservation hijack” scams. What Happened At Booking.com? Booking.com has confirmed that unauthorised third parties accessed customer reservation data, including names, email addresses, phone numbers, home addresses, and details of past and upcomi...Read more
-
How ‘Nuclear Batteries’ Could Unlock Clean Energy Efficiency
A fusion energy startup is developing a new class of nuclear battery that could help solve one of the biggest challenges in clean energy, turning radiation directly into electricity rather than wasting it as heat. It also offers an interesting signal for organisations thinking about Business Continuity Solutions and resilient infrastructure. What Avalanche Energy Is Building With […]...Read more
-
The 5-Minute Security Check for Browser Add-ons
It usually starts small. Someone uses an AI tool to refine a difficult email. A team member enables an AI add-on inside a SaaS app because it promises to save an hour a week. Somebody pastes a paragraph into a chatbot to “make Browser add-ons have a funny reputation. They feel “small”. A quick install. […]...Read more
-
Protecting Your Staff from Fake Recruitment Scams
A fake recruiter message is one of the cleanest social engineering tricks around because it doesn’t look like a trick. That’s why LinkedIn recruitment scams work so well inside real businesses. They don’t arrive as malware. They arrive as a normal conversation that nudges someone toward one small action: click this link, open this file, […]...Read more
-
The “Session Cookie” Hijack
MFA is a strong front-door lock, but it’s not the only thing that decides whether someone can get in. After you sign in, your browser keeps you logged in using a session token (often stored as a cookie). It’s the digital version of a wristband at an event: once you’ve been checked, the wristband proves […]...Read more
-
Clean Desk 2.0: Securing Your Home Office from Physical Data Leaks
In the traditional office, a Clean Desk policy was a simple habit: shred the sensitive stuff, lock it away, and don’t leave passwords where someone can see them. Today, the same idea still matters but the “desk” has changed. For many teams, the home office is now the default workspace, and that means physical access […]...Read more
-
Microsoft Tests Copilot Update That Opens Links Inside The App
Microsoft is testing a new Copilot feature in Windows that opens web links directly inside the Copilot app rather than launching the user’s browser, allowing the assistant to display web content alongside AI conversations. A New Way To Browse With Copilot The change is part of an update to the Copilot app for Windows that […]...Read more
Navigate by Subject
25 Years (1)
Anniversary (1)
Apple Bytes (9)
Artificial Intelligence (168)
BlockChain (24)
Brexit (4)
Celebrating (1)
Cloud (19)
communication (80)
Company News (29)
Confidental (4)
Confidential (32)
Covid-19 (35)
Cyber Security (3)
Digital Marketing (15)
Education (9)
Future (28)
GDPR (13)
GMA (6)
Google (104)
Gregory Micallef Associates (1)
Hardware (52)
Health (38)
IT (356)
IT Strategy (11)
IT Support (5)
Latest News (2)
Law (84)
Laws (1)
Marketing (15)
Microsoft (69)
Mobile (68)
News (1)
Office 365 (9)
Other News (141)
Phishing (1)
Phone System (8)
Privacy (1)
Ransomware (3)
Security (233)
SEO (4)
Social Media (125)
Sustainability (125)
Transport (46)
Web Design (21)
