WannaCry Ransomware

Share This: WannaCry ransomware — also known as WCry, Wana Decrypt0r, WannaCrypt, and WanaCrypt0r! With the ongoing attack which started last week and after receiving several calls and mails over the weekend for some advice on how best to protect against ransomware, I thought I would put together some advice. Backup With any form of […]

DynDNS - DDoS

The flood of Vulnerable Internet Connected devices allows massive DDoS attacks on Dyn DNS Provider

Share This: The flood of Vulnerable Internet Connected devices allows massive DDoS attacks on Dyn DNS Provider!   What does IoT really mean? IoT stands for Internet of Things, over the last decade, the amount and methods with which we connect to internet services have changed, broadband has become more widely available this, together with […]

Ransomware Part 3, Threats and Culture

Share This: In part three of the series of articles about Ransomware, we examine the threat of ransomware looking at some of the industries and look at some reasons why some areas are affected more than others. We also review culture and see if this has any effect on ransomware mitigation In previous articles we […]

Juniper Networks

Juniper Networks released a emergency patch for its screenOs

Share This: Juniper Networks released a emergency patch for its screenOs yesterdays because of vulnerability with unauthorised code which could allow an attacker to gain administrative access and decrypt VPN connections. Juniper, however have not commented on the origin of the code it found. According to threatpost.com(1) “Juniper senior vice president and chief information security […]

Apple itunes and app store hit by zero Day bug

Share This: Apple itunes and app store hit by zero Day bug A Zero day bug has been found which allows attackers to hijack users whilst purchasing, this is reportedly allowing the hijackers to then purchase, download any app or movie they wish. The filter bypass flaw in Apple’s online invoicing system was found by […]

Venom – CVE-2015-3456 Hypervisor Floppy Emulator Vulnerability

Share This: Security Researchers have discovered a new Zero-Day vulnerability in the virtual floppy drive used by virtualisation platforms. The Floppy Disk Controller emulation Vulnerability has been assigned CVE-2015-3456 (1) is now being referred to as VENOM, was discovered by Jason Geffner of CrowdStrike, Inc. The vulnerability was rated as having an Important impact. A […]