It is Father’s Day this Sunday, and just in case you still have to buy your Dad a present, I have some ideas over on Octagon Technology that might help you out: Of course if you are well organised, you bought a gift, card and booked the restaurant or food …
CPU vulnerabilities – and it does not matter if you are team Intel, team AMD or team Apple!
There have been two pieces of recent research that are pointing to serious issues with a lot of the silicon we use to power our computers. Some of which may be irreparable. The Apple M1 attack is called PACMAN, as it exploits the Pointer Authentication Code (PAC). This attack bypasses …
Distributed Denial of Service attacks
The denial-of-service (DoS) attack, is a common attack used by those who want to make a point or make money, by disrupting the availability of websites and web services. In simple terms the threat actor finds a way to flood a system with malicious network traffic to overload network infrastructure …
How the threat actors can get ransomware onto your systems
Before any malware can carry out the malicious tasks it was designed to do – it has to get into and infect a host system. This can be done in a variety of ways. It can be something as simple as plugging in an infected USB stick into your computer …
Continue reading “How the threat actors can get ransomware onto your systems”
The world is a better place with less social engineering scams
Here is a good news story: A two month operation – called First Light 2022 – between law enforcement agencies of 76 nations has led to the seizure of millions of pounds of assets and the arrest of thousands. The organised gangs targeted were behind hundreds of telecommunications and social …
Continue reading “The world is a better place with less social engineering scams”
