The Tor browser is an excellent tool for privacy – and I have written about it before – the BBC hosts it’s News service on Tor. Making it available to people around the world, who may not want the authorities knowing that they are accessing an alternative source of information. …
Samsung smartphones with leaky security – update and advice
Here is some follow-up to the Android Trusted Execution Environment security issue with Samsung smartphones. 100 million Samsung phones affected by encryption weakness | TechRepublic The advice here is whatever device you have, keep those patches and updates up-to-date. Samsung smartphones with leaky security – Smart Thinking Solutions Samsung Encryption …
Continue reading “Samsung smartphones with leaky security – update and advice”
Daxin – rootkit backdoor malware
The United States’ Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the threat hunting team from the security company Symantec have discovered rootkit malware that can quietly open backdoors into systems. This malware, called “Daxin”, has been linked with Chinese operations connected with the hacking group Middle Kingdom and …
Nvidia malware – on their internal systems and included in unauthorised “unlocking” software
Nvidia is investigating a malware issue on it’s internal systems that may or may not be ransomware. Nvidia probes cyberattack on internal systems • The Register Nvidia consumer GPUs are installed with software to prevent their use in crypto-currency operations – theoretically preserving those GPUs for the use of gamers …
The new war – Is your final defence up to the job?
Thinking about the following article: The backups and operational continuity plans that businesses and organisations have in place are so important – because all your technical defences can be defeated and your hacked. The Russia Ukraine conflict has revealed a new type of hacker – they may be white hat, …
Continue reading “The new war – Is your final defence up to the job?”
