Author Archives: admin

There’s a hole in my bucket

      Comments Off on There’s a hole in my bucket

Amazon’s S3 servers are proving to be distinctly leaky. Security advisers have identified that over a third of its cloud storage buckets appear to be unencrypted, and 7% are currently exposed online. Already this year, S3’s misconfiguration has resulted in several data breaches, including high profile leaks at Wells Fargo,… Read more »

Share

Botnets assemble

      Comments Off on Botnets assemble

A powerful and aggressive global army is on the march, and it isn’t Islamic State or North Korean or Russian – at least not specifically. It’s an army of botnets. According to cybersecurity specialist Symantec’s latest botnet tracker, the worldwide botnet army was swelled by 6.7million new bots during 2016…. Read more »

Share

Tech firms targeted through CCleaner backdoor

      Comments Off on Tech firms targeted through CCleaner backdoor

It’s bad enough when a piece of security software installed on nearly three quarters of a million PCs turns out to be corrupted. It’s even worse when it appears that this may be a backdoor through which hackers can and have released malware into the affected systems. To find that… Read more »

Share

School’s out – thanks to some hackers

      Comments Off on School’s out – thanks to some hackers

Students in Flathead Valley, Montana recently found themselves with an unscheduled long weekend vacation, due to a cyber attack on the district’s education community by a hacking group calling itself TheDarkOverlord. The attackers are believed to have harvested sensitive information on past and present pupils, parents and staff at thirty… Read more »

Share

Record-breaking year for breaches

      Comments Off on Record-breaking year for breaches

The first half of 2017 has already witnessed more data leaks and thefts than in the whole of the previous year. So far 1.9 billion records have been compromised since January 1st, up from 1.37 billion in the whole of 2016 – that means, on average, every day over 10… Read more »

Share

Equifax compounds data breach fiasco

      Comments Off on Equifax compounds data breach fiasco

Not content with falling victim to one of the worst data breaches in history, leading credit rating firm Equifax has been sending its anxious customers to a fake website to check whether or not they have been compromised. Fortunately for all concerned, the site’s developer had no evil intentions, but… Read more »

Share

Students, beware of SLC phishing scam

      Comments Off on Students, beware of SLC phishing scam

As the new academic year begins, students are looking to organise their finances. Little surprise then, that hackers have decided to use a well established institution, the Student Loans Company, to scam students out of their hard-earned (or their parents’) money. The past few weeks have seen a phishing campaign… Read more »

Share

September Patch Tuesday contains crucial fixes

      Comments Off on September Patch Tuesday contains crucial fixes

In what’s become a regular fixture on the cybersecurity calendar, major tech giants recently issued a welter of updates as part of September’s Patch Tuesday. Adobe has repaired a couple of flaws in its Flash Player, released an update for its RoboHelp help authoring tool and mended four glitches in… Read more »

Share

Which positions are the most phished?

      Comments Off on Which positions are the most phished?

New research suggests that when it comes to business email compromise (BEC) attacks (also known as spear-phishing or simply phishing attacks), hackers most often take on the guise of CEO, managing director and president. Targets are, perhaps unsurprisingly, frequently decision makers in the finance department. The researchers’ analysis turned up… Read more »

Share

Bluetooth leaves gates wide open to cyberattacks

      Comments Off on Bluetooth leaves gates wide open to cyberattacks

Locking our house or car comes as second nature. Switching off our Bluetooth connection when we’re not using it should also be an automatic security measure. Why? Because researchers have identified an attack called BlueBorne that exploits a range of vulnerabilities inherent in Bluetooth’s implementation in several software systems –… Read more »

Share