If you share information online and are not extremely careful on what you share, then someone somewhere will work out how to exploit that information. Now I thought people who used Strava understood this as there has been plenty in the past of Strava compromising military security let alone personal …
Another network hardware flaw – this time VPNs
Lat week it was Barracuda this week it is Fortinet VPNs: Fortinet fixes critical RCE flaw in Fortigate SSL-VPN devices, patch now (bleepingcomputer.com) By now you should have realised that network hardware has to be on your cyber security to do list. A note on VPNs I am away this …
Continue reading “Another network hardware flaw – this time VPNs”
Buy new hardware!
This is always a difficult conversation with clients – when we come across redundant hardware or hardware that is reaching or reached it’s EOL – “you need to replace it”. It is always the cost! However sometimes you just have to do it – especially if it causes a security …
You need an Android smartphone BYOD policy
Here is another mass download of a malware infected Android app: SpinOk Android malware found in more apps with 30 million installs (bleepingcomputer.com) Please have a look at this: Scanning for Apple iPhone iOS malware You need a bring-your-own-device policy for your phones. This policy should also include to company …
Continue reading “You need an Android smartphone BYOD policy”
Scanning for Apple iPhone iOS malware
This is not what you are thinking. It is not a malware scanner on your Apple iPhone and it is for a very specific malware infection. What it is a multi-platform scanner produced by, the Russian security company, Kaspersky to detect if an iOS device has been infected with ‘Triangulation’ …
