Category Archives: all posts

Oracle fixes a veritable swarm of bugs

      Comments Off on Oracle fixes a veritable swarm of bugs

As part of its quarterly Critical Patch Update, Oracle has issued fixes for a total of 250 bugs. This comes hot in the heels of the keynote speech at Oracle OpenWorld given by Larry Ellison, co-founder of the multinational provider of database technology, enterprise software and cloud engineered systems. While… Read more »

Share

FBI requests help fighting DDoS attacks

      Comments Off on FBI requests help fighting DDoS attacks

As part of its effort to stem the ever-growing flow of DDoS attacks, the FBI is asking corporate victims to share details of incidents. The kind of information they are looking for includes the attackers’ traffic protocols, IP, email and cryptocurrency wallet addresses, netflow and packet capture logs; plus the… Read more »

Share

HMRC phishing campaign hits UK businesses

      Comments Off on HMRC phishing campaign hits UK businesses

Not unnaturally, people greet any correspondence from HMRC that drops into their inbox with a slight feeling of dread. Until recently it has generally involved nothing more than a request to pay owed tax. Now, however, it could be something a bit more insidious – a Trojan that gives hackers… Read more »

Share

Is our Wi-Fi no longer safe?

      Comments Off on Is our Wi-Fi no longer safe?

The WPA2 security protocol (stands for Wi-Fi Protected Access 2 and is the common method of securing networks through the use of a ‘key’) has been providing effective and reassuring protected access for wireless networks since 2004. Suddenly, however, all bets are now off – due to a new threat… Read more »

Share

Are your emails secure?

      Comments Off on Are your emails secure?

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol for sending digitally signed and encrypted messages. So far, so good. Unfortunately, if you use Microsoft Outlook to send secure emails, any set-up employing S/MIME may not be encrypted after all – leaving the email contents wide open to snoopers. The trouble… Read more »

Share

More medical records exposed

      Comments Off on More medical records exposed

The general health of cybersecurity in the medical profession can only be described as parlous. Yet another case of lame practice has resulted in the sensitive medical records of 150,000 patients (including sensitive medical information such as blood test results), amounting to more than 47GB of data, being left for… Read more »

Share

Don’t always do what a pop-up tells you

      Comments Off on Don’t always do what a pop-up tells you

Be wary of plausible-looking log-in forms – they could be a phishing attack designed to steal your password.  An Apple iOS researcher has discovered that it takes hardly any time or expertise to knock together the coding for a bogus pop-up requesting a user’s credentials. Even Apple’s two-factor authentication is… Read more »

Share

Fintech company ignores hole in its software

      Comments Off on Fintech company ignores hole in its software

Despite repeated warnings from a number of security organisations, Swiss banking technology company BPC continues to maintain that its SmartVista ecommerce software system remains secure. BPC deploys its SmartVista product suite in sixty countries, either as an individual point solution to meet a specific need or implemented together to form… Read more »

Share

Yahoo breach even bigger than first thought

      Comments Off on Yahoo breach even bigger than first thought

It now looks as if every one of Yahoo’s 3 billion account holders was affected by the data breach in 2013, a figure dramatically larger than the original estimate of 1 billion. Yahoo, which is now part of Verizon’s media and telematics subsidiary Oath Inc, was breached again in 2014,… Read more »

Share

The changing face of cybercrime

      Comments Off on The changing face of cybercrime

According to speakers at the Cambridge Cyber Summit in Massachusetts, the world of cybercrime is shifting as hackers line up new targets. Not that anyone nostalgic for the good old days need worry – ransomware and critical infrastructure attacks aren’t likely to disappear any time soon. It’s some interesting insight… Read more »

Share