This page will show articles related to specific hardware and software vulnerabilities. Our Twitter feed is also a good place to look for breaking stories in the press on new vulnerabilities.
It doesn’t matter whether you are a consumer or a large corporation, you can’t hope to produce everything you need on a daily basis. You can’t produce enough food to feed yourself, and a company can’t build all the operating systems and applications to run its business. We all depend on suppliers of some form,… Continue Reading →
We have blogged extensively on how and why you should backup your data. However, as we have all gone to a more remote working scenario due to current events, it is even more important to ensure your valuable data is backed up. During the pandemic we have seen an increase in cyber attacks, and in… Continue Reading →
Starting 16 January 2021, Flash Player is officially dead and any current installations will block the playing of any Flash content. Adobe ceased to support Adobe Flash Player as of 31 December 2020 and all download pages from their website have been taken down. Why is this happening? Adobe Flash Player is a legacy multi-media… Continue Reading →
As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China… Continue Reading →
Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →
We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kind Fitness Trackers GPS Trackers… Continue Reading →
What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first… Continue Reading →
There is a lot of press coverage on what is called ‘The Internet of Things’, or abbreviated to IoT. What is IoT? This is a collection of devices that are not typically identified as computers. They can be anything from: Light bulbs connected to a home automation system Domestic appliances Sensors on industrial plant Industrial… Continue Reading →
In the past few weeks a highly dangerous vulnerability has been made public in older (and largely unsupported or near end of support) versions of Windows, namely: Windows Server 2008 Windows 7 Pro Windows 2003 Windows XP Pro. This is being named ‘BlueKeep’ and has been proven to be remotely exploitable without any authentication. There… Continue Reading →
When was the last time you received an update to the device you are reading this on? If it was within the last month, you are among the lucky ones. If you are on a Windows 10 PC, Mac, iPhone/iPad then you will receive regular updates, but if you are on Android, then its a… Continue Reading →
Something went wrong. Please refresh the page and/or try again.