Once it required a level of technical skill, practice and hardware resources to carry out successful cyber attack that would make (illicit) money. Now researchers have discovered and easy to use framework that enables any would be hacker to craft sophisticated attacks, deploy them, steal information and monetise them: New …
Yesterday was Patch Tuesday for Microsoft
So, everyone knows what that means, for the users, slow internet connections as we all gather in those vital updates, for the administrators, checking what needs to be done and checking that it has happened – including checking that the users have not skipped the updates because they are too …
Continue reading “Yesterday was Patch Tuesday for Microsoft”
The “hidden in plain sight” cyber attack
Steganography When we were looking at steganography cyber attacks – hiding malicious code inside for instance image files – I was surprised just how much malware could be hidden without degrading the image. Here is a real-world example of this rare type if attack, spy are code embedded in a …
Chaos
Black Lotus Labs has discovered a new strain a malware, they are calling it Chaos. The new is very telling – the malware is infecting a wide range of devices and servers, Linux, Windows, small office routers etc. One of the servers infected was hosting an instance of GitHub, bringing …
New simple security feature in Windows
The latest release of Windows 11, now includes Enhanced Phishing Protection, which sounds complicated, and I am sure the implementation of it is complex, but the security advantage it offers is obvious and simple. Windows 11 will warn you when you type a password into an insecure website or application. …