Security

Home/Security

Worm based Key-logger Malware Lucifer is making the rounds

Banking key-logger malware has become more and more common place in a society dominated by online banking. Consequently, as more and more people crowd onto the internet for internet banking, hackers are developing new ways to access sensitive user data. Recently, Unit 42 security researchers uncovered a new form of security exploiting software. Its one [...]

July 28th, 2020|

Windows DNS Vulnerability – Microsoft Alerts users of a Critical 17 year old Exploit

Microsoft warns System Admin's of a critical Windows DNS Server flaw. The vulnerability, which has been around since 2003, has the potential for an attacker to plant special malware that remotely executes on Windows Servers. Malicious DNS queries are then sent to other critical infrastructure, leading to security breaches across your entire IT environment. Mechele [...]

July 15th, 2020|

KrØØk – The Security Vulnerability affecting WiFi Encryption

Last week ESET security researchers published a white paper on a new WiFi Encryption Vulnerability. The Vulnerability is related to KRACK (Key Reinstallation Attacks) discovered in 2017, but is fundamentally different. KrØØk affects both WPA2-Personal and WPA2-Enterprise protocols, with AES-CCMP encryption. KrØØk is a vulnerability that affected billions of devices. Potentially causing the leak of [...]

March 9th, 2020|

Key practices for securing your small business’s IT environment

If you run a small business, Your IT environment is one of your largest Liabilities. With almost all of your data flowing through a computer system at one point or another, your IT environment deserves the very best in security implementations. As a small business owner, It can be very easy to let your security [...]

November 21st, 2019|

Microsoft Blocking an additional 38 file extensions in Outlook.

Microsoft is banning almost 40 new types of file extensions on its Outlook email platform. Because of the rise in email scam's and email spread malicious software. This has prompted Microsoft to tighten security on its outlook email platform. Microsoft had originally blocked over 100 file extensions from email attachments. “While the associated vulnerabilities had [...]

September 30th, 2019|

Certain Router Models Riddled with Remotely Exploitable Vulnerabilities

Independent security researchers have found over 100 different Vulnerabilities across 13 different Router and NAS models. The targets ranged from routers designed for general consumers to high-end devices designed for enterprise use. And all 13 of the devices evaluated had at least one web application vulnerability.  One of the researchers Stated; We obtained root shells [...]

September 18th, 2019|

Canon DSLR cameras found vulnerable to ransomware

Canon has issued a global security advisory warning pertaining to its DSLR, Mirror-less and compact cameras. The problem is related to Canon's digital cameras which feature the Picture Transfer Protocol (PTP) communication system. The security issue discovered by Check Point software technologies is of serious concern. They advise that they were able to Break into [...]

August 19th, 2019|

Turn Off AirDrop To Keep From Leaking Your Phone Number

You’re most likely to encounter AirDrop in a public space when you’re blocking some random stranger from sending you a weird picture or greeting. But if you ever need to toss a file between devices. Maybe that funny picture you just took of your friends at a bar, wait until you’re home, for security’s sake. [...]

August 4th, 2019|