This page will show articles related to specific hardware and software vulnerabilities. Our Twitter feed is also a good place to look for breaking stories in the press on new vulnerabilities.
Starting 16 January 2021, Flash Player is officially dead and any current installations will block the playing of any Flash content. Adobe ceased to support Adobe Flash Player as of 31 December 2020 and all download pages from their website have been taken down. Why is this happening? Adobe Flash Player is a legacy multi-media… Continue Reading →
As we come to the end of 2020, is is customary to review what has happened in the previous 12 months and learn from any events that happened. At the beginning of 2020, no one could have foreseen the chaos that the novel coronavirus COVID-19 would bring. While the start of it was in China… Continue Reading →
Your home/small office Internet router is your gateway to the Internet. It is a combination of hardware, software and communication protocols that coexist in a complex system. As such, your router is subject to software and hardware vulnerabilities in much the same way as your PC or mobile device. Illustration 1 On 19 June 2020… Continue Reading →
We all like our gadgets, whether they have some form of smart technology in them or not. Wearable technology is also very popular. What is wearable technology? Wearable technology is simply a technology, or device, that you can attach to your body. This can be: Smart Watches, including the non-smart kind Fitness Trackers GPS Trackers… Continue Reading →
What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first… Continue Reading →
There is a lot of press coverage on what is called ‘The Internet of Things’, or abbreviated to IoT. What is IoT? This is a collection of devices that are not typically identified as computers. They can be anything from: Light bulbs connected to a home automation system Domestic appliances Sensors on industrial plant Industrial… Continue Reading →
In the past few weeks a highly dangerous vulnerability has been made public in older (and largely unsupported or near end of support) versions of Windows, namely: Windows Server 2008 Windows 7 Pro Windows 2003 Windows XP Pro. This is being named ‘BlueKeep’ and has been proven to be remotely exploitable without any authentication. There… Continue Reading →
When was the last time you received an update to the device you are reading this on? If it was within the last month, you are among the lucky ones. If you are on a Windows 10 PC, Mac, iPhone/iPad then you will receive regular updates, but if you are on Android, then its a… Continue Reading →
UPDATE 23 March 2019 … More than 100 exploits have been discovered that are exploiting the WinRAR vulnerability. Two such attacks involve: A bootlegged copy of Ariana Grande’s hit album “Thank U, Next” with a file name of “Ariana_Grande-thank_u,_next(2019)_.rar ” that is currently only being detected as malware by 11 security products, whereas 53 antivirus… Continue Reading →
This is a bit technical, so I will try to explain it in simple language that most people can understand, and if you want to read the technical detail I will post a link to the research at the end of this blog post. A lot of PC’s and Laptops (Windows, Mac’s and Linux based… Continue Reading →
Something went wrong. Please refresh the page and/or try again.