Attackers are always looking for new way to get their illicit packages through defences and this research paper outlines how by exploiting Unicode, malicious code can be written into software so that human code reviewers cannot recognise that it is there. Trojan Source: Invisible Vulnerabilities “This work has been under …
Are you still using RDP? If so examine your risk!
Remote Desktop Protocol (RDP) was very popular, until it’s vulnerabilities came to light. It’s time to disconnect RDP from the internet | WeLiveSecurity Today Sans Internet Storm is reporting an increase in probes being initiated against RDP services – even though it is a well known weak service. Remote Desktop …
Continue reading “Are you still using RDP? If so examine your risk!”
Scams. How Many? – #BeCyberSmart
Something simple for a weekend. I have been doing a lot reading lately for updating our email/phishing training and came across this list of scams that are used by cyber criminals. It is not complete! Old Scams Finding New Victims ✓ Advance fee schemes✓ Apartment deposit scams✓ Bitcoin scams✓ Bulk-mailing …
Ransomware is “highly profitable” – #BeCyberSmart
I make no apology, we are back to ransomware. This was reported by the BBC yesterday: Cyber-attack hits UK internet phone providers – BBC News Earlier in the week, The Guardian quoted, Jeremy Fleming, the head of GCHQ saying that ransomware is highly profitable for the criminals – obviously not …
Continue reading “Ransomware is “highly profitable” – #BeCyberSmart”
Tesco defends against an attack
Tesco reports that services are back to normal after some disruption over the weekend. However as with any cybersecurity incident, action continues to be taken to check if any other systems are compromised – but I have changed my Tesco password, Tesco website and app back up after hack attempt …