Top

Tag: Information Sensitivity Policy

2016
28 Mar

Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems. Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware[…]

28 Mar

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be[…]

14 Feb

Bringing cyber to the board Cyber crime costs British businesses £34bn a year* Not just an IT issue, boards need to take note of consumers’ awareness and cynicism about how their data is used. Building the right cyber strategy, with[…]

21 Jan

The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. Back in December when I revamped the SSH banner and started collecting the fingerprint I noticed an[…]

2015
25 Oct

Sending a Certain Text Message Will Force Anyone’s iPhone to Shut Down. A flaw in Apple’s iOS is allowing pranksters to remotely shut down other people’s phones. ………………….. Effective. PowerDown لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗 ℵαʊṧнα∂ ……………………… Some iPhone[…]

End