A couple of links
May. 30th, 2024 03:18 pmThese links have been lingering in my various email inboxes via various mailing lists for quite a while, and I thought it worth finally making the effort to share them.
This report about Dubai real estate being used as a money-laundering vehicle was informative and sobering. There's a really well-made interactive map of the city and properties, and a roll-call of incredibly shady characters who avail themselves of all Dubai has to offer the super rich.
I'm not sure if you're aware, but back in October 2023, the British Library was targetted in a cyber attack, the consequences of which are still being felt. (This comes as part of a massive uptick in such attacks — by Russia, we all know it's Russia — on educational institutions and library services, and what's been reported and admitted publicly is only the tip of the iceberg.) The British Library's report into lessons learnt as a result of the attack makes very interesting reading, and emphasises a lot of things that the general public don't tend to understand about these kinds of attacks. The main point being, robust organisational IT security measures can only protect you so far — the vulnerability tends to be at individual level (reuse of passwords, lack of multifactor authentication, clicking on dodgy links in phishing emails), or by organisations using legacy or in-house software that lacks compatibility with antivirus software and other security measures. And once the attack has happened, it takes a long time to restore services — the British Library is still not functioning as normal.
This report about Dubai real estate being used as a money-laundering vehicle was informative and sobering. There's a really well-made interactive map of the city and properties, and a roll-call of incredibly shady characters who avail themselves of all Dubai has to offer the super rich.
I'm not sure if you're aware, but back in October 2023, the British Library was targetted in a cyber attack, the consequences of which are still being felt. (This comes as part of a massive uptick in such attacks — by Russia, we all know it's Russia — on educational institutions and library services, and what's been reported and admitted publicly is only the tip of the iceberg.) The British Library's report into lessons learnt as a result of the attack makes very interesting reading, and emphasises a lot of things that the general public don't tend to understand about these kinds of attacks. The main point being, robust organisational IT security measures can only protect you so far — the vulnerability tends to be at individual level (reuse of passwords, lack of multifactor authentication, clicking on dodgy links in phishing emails), or by organisations using legacy or in-house software that lacks compatibility with antivirus software and other security measures. And once the attack has happened, it takes a long time to restore services — the British Library is still not functioning as normal.