We have clients who use the popular VNC (Virtual Network Computing) service to access computers – all of them implement our security policy. Do you have a security policy that covers this type of software and access? Over 9,000 VNC servers exposed online without a password (bleepingcomputer.com)
Because It’s Friday – Writing code is difficult…
Be More Like Dave – Dilbert Comic Strip on 2022-08-07 | Dilbert by Scott Adams …so you or your cyber security consultant should check any code (web app or software) you have written for you. How secure is open source software? Do you use open source software or have software …
Continue reading “Because It’s Friday – Writing code is difficult…”
Cybersecurity and Infrastructure Security Agency exploited vulnerability advisory. How this type of mistake can impact your cyber security and steps to protect yourself.
The US Cybersecurity and Infrastructure Security Agency has added a new vulnerabilities to it’s Known Exploited Vulnerabilities Catalog. CISA Adds One Known Exploited Vulnerability to Catalog | CISA This is an interesting issue, as credentials had been hard coded into the application: “Atlassian Questions For Confluence App has hard-coded credentials, …
How secure is open source software? Do you use open source software or have software written for you? If so read on… UPDATED
When we undertake any cyber security survey, and we ask about software, we know the greatest amount of work we will have to do, is when the client says “we had this written for us” or we use this “open source software”. (We will not get into Android apps or …
A new place to get a different viewpoint on cyber security – CyberAwake
As well as yesterday being the day we published our 1000th post here, on Smart Thinking. It was also the day we launched the blog on the CyberAwake training site. The content of the CyberAwake blog will be different from Octagon and Smart Thinking, with an emphasis on the issues …
Continue reading “A new place to get a different viewpoint on cyber security – CyberAwake”