Archived articles

IT Security Archive

Past important security information, including timely alerts and advice on prevailing threats and general good counsel on organisational IT security.

digital image with floating characters

Dell software exposes security flaw

Dell has admitted that it as unintentionally installed software on their machines that contains a serious security flaw that can be taken advantage of.

iPhone code leak

iPhone code leaked

The iPhone’s operating system source code has apparently been leaked online.

Mouse security

UK consumers want more protection on data

Symantec’s State of Privacy report has found that consumers in the UK don’t believe that the government and businesses do enough to ensure their data is secure.

Hacker

Locky Ransomware

A new family of ransomware has come about called Locky Ransomware. While it follows the same pattern as other Ransomware by encrypting local files and holding the private encryption keys at ransom, the deployment has some minor differences.

digital lock on screen

Two-thirds of big UK businesses targeted by cyber criminals

Cyber Security Breaches Survey has found that two-thirds of large UK enterprises have been victims of a cyber-attack in the last year.

WhatsApp logo

WhatsApp locks down communications

Instant communication giant WhatsApp has confirmed that End-to-End encryption will be applied to all its services.

police tape

Symantec state that Apple is next on hit-list

Leading security firm, Symantec, has vocalised its concerns about the growing popularity of malware designed to target OS X and IOS (Apple’s mobile operating system). Symantec states that the amount of malware has almost doubled this year.

Android security

Android security is better, but companies should be prudent

Companies need to consider the risks as well as the benefits of Android’s operating system, warn experts.

Cyber security

Improvements in collaboration will improve security

The popularity of cloud computing and mobile technologies growing has brought with it more security challenges – and experts believe that security technologies and cross-industry collaboration are key to security success going forward. 

Phishing attacks

Phishing attacks continue to grow in popularity

Studies conducted by Intel Security discovered that up to 94% of users were unable to tell the difference between genuine emails and a phishing attempt.

Microsoft

Microsoft Security Bulletin Summary for April 2015

The latest release of news bulletins have been released from Microsoft for April 2015 and ten out of eleven are related to vulnerabilities with the windows OS. Three of these could allow remote code execution, in this the limitation of how destructive it can be is what privileges the compromised account has.

Enter password

Scan for unsecured passwords in your Inbox

The most common form of reminder for a forgotten password is email, from your colleague sending the password over for an encrypted document to amazon sending a new password. Most people pride themselves that their password is safe and no one can guess it but what if you didn’t permanently delete the email after memorising the password?

Cyber security

Phishing: It’s a matter of minutes

A report produced by Verizon has found that from the start of a phishing campaign to its first successful victim takes only a worrying 82 seconds.

Cyber security image

Users are NOT to blame for successful phishing attacks

Users should not be the first to receive the blame for a successful phishing attack, says security awareness expert.

Cyber attacks

Increase in cyber-attacks on large companies in 2014

There was a 40% increase in the number cyber-attacks carried out on large companies in 2014, as criminals hijack infrastructures and attack from within, according to IT security firm Symantec.

Wireless and mobile security

Reduce WiFi hacking risk

The internet can be dangerous and there is always someone trying to use its massive reach for their own personal illegitimate gain. Being yet another victim of hacking is becoming common place now due to the vast amount of devices that are connected to the internet - but this doesn’t need to be the case.