Share This: WannaCry ransomware — also known as WCry, Wana Decrypt0r, WannaCrypt, and WanaCrypt0r! With the ongoing attack which started last week and after receiving several calls and mails over the weekend for some advice on how best to protect against ransomware, I thought I would put together some advice. Backup With any form of […]
Category Archives: Vulnerabilities
With the recent LastPass Vulnerability – Should we use Password Managers at all?
Share This: We all must be aware of the risks of using passwords……. Or are we! We are constantly told / or tell (depending on our role) users what to do and not to do, things like: Use separate passwords for each secure site Change them regularly is what we all advise Use easy to […]
The flood of Vulnerable Internet Connected devices allows massive DDoS attacks on Dyn DNS Provider
Share This: The flood of Vulnerable Internet Connected devices allows massive DDoS attacks on Dyn DNS Provider! What does IoT really mean? IoT stands for Internet of Things, over the last decade, the amount and methods with which we connect to internet services have changed, broadband has become more widely available this, together with […]
Ransomware Part 3, Threats and Culture
Share This: In part three of the series of articles about Ransomware, we examine the threat of ransomware looking at some of the industries and look at some reasons why some areas are affected more than others. We also review culture and see if this has any effect on ransomware mitigation In previous articles we […]
Juniper Networks released a emergency patch for its screenOs
Share This: Juniper Networks released a emergency patch for its screenOs yesterdays because of vulnerability with unauthorised code which could allow an attacker to gain administrative access and decrypt VPN connections. Juniper, however have not commented on the origin of the code it found. According to threatpost.com(1) “Juniper senior vice president and chief information security […]
Apple itunes and app store hit by zero Day bug
Share This: Apple itunes and app store hit by zero Day bug A Zero day bug has been found which allows attackers to hijack users whilst purchasing, this is reportedly allowing the hijackers to then purchase, download any app or movie they wish. The filter bypass flaw in Apple’s online invoicing system was found by […]
Venom – CVE-2015-3456 Hypervisor Floppy Emulator Vulnerability
Share This: Security Researchers have discovered a new Zero-Day vulnerability in the virtual floppy drive used by virtualisation platforms. The Floppy Disk Controller emulation Vulnerability has been assigned CVE-2015-3456 (1) is now being referred to as VENOM, was discovered by Jason Geffner of CrowdStrike, Inc. The vulnerability was rated as having an Important impact. A […]