Software and hardware does have a use by date. Even though the equipment or software may still appear serviceable, if the vendor stops supplying updates, then the threat actors will start looking for vulnerable unsupported targets. Martin has written about this over on the Octagon Blog this month: Older versions …
It is not just Windows, Macs get hacked as well…
I can remember, in the past, being lectured by clients who had Mac who told me they could not get a virus on their computer whilst my Windows machines were vulnerable. Well in those days Macs did not make inviting target for threat actors for many reason, however today with …
Continue reading “It is not just Windows, Macs get hacked as well…”
When legacy systems become a problem.
Nearly every organisation has some legacy systems somewhere – we still have both flavours of Zip Drives available and other out of date hardware just in case. Our legacy systems are because of what we do, but in most cases, it is financial considerations that means old and vulnerable systems …
Phishing Attacks
It would have been difficult to miss the fact that Marks and Spencer, the Co-Op and Harrods have all suffered serious cyber-attacks recently. There has been speculation that the attacks originated from a phishing attack, as the hacking group DragonForce bragged in an email that they had hacked an employee …
Fake Zoom
Before the pandemic nearly no one had heard of Zoom, but following a stellar take up of the service there is hardly anyone online who has not used it. This makes it a perfect target for hackers: Be Careful With Fake Zoom Client Downloads – SANS Internet Storm Center Your …
