Attackers are always looking for new way to get their illicit packages through defences and this research paper outlines how by exploiting Unicode, malicious code can be written into software so that human code reviewers cannot recognise that it is there. Trojan Source: Invisible Vulnerabilities “This work has been under …
National Cyber Security Centre Threat Report
Here is a link to the NCSC weekly threat report for week ending 29/10/2021: Weekly Threat Report – NCSC.GOV.UK
Hands up if this surprises you?
The politicians thought that they were safeguarding us (the citizens they were charged with protecting) when they debated and then voted in the GDPR amendments to the Data Protection Act. As citizens we have the right to believe that those MPs who lack a technical education got advice from a …
Hallowe’en and maybe the hacker god will return from the dead! – #BeCyberSmart
In 2017 an academic paper1 about printer security highlighted open ports on many different types of printer. The paper was published on Monday 30 January and the following weekend a hacker using the pseudonym Stackoverflowin searched the internet to find vulnerable printers. The hacker then made his way into over …
Continue reading “Hallowe’en and maybe the hacker god will return from the dead! – #BeCyberSmart”
Are you still using RDP? If so examine your risk!
Remote Desktop Protocol (RDP) was very popular, until it’s vulnerabilities came to light. It’s time to disconnect RDP from the internet | WeLiveSecurity Today Sans Internet Storm is reporting an increase in probes being initiated against RDP services – even though it is a well known weak service. Remote Desktop …
Continue reading “Are you still using RDP? If so examine your risk!”