Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems. Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware[…]
Tag: Information Sensitivity Policy
If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be[…]
Bringing cyber to the board Cyber crime costs British businesses £34bn a year* Not just an IT issue, boards need to take note of consumers’ awareness and cynicism about how their data is used. Building the right cyber strategy, with[…]
The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. Back in December when I revamped the SSH banner and started collecting the fingerprint I noticed an[…]
Sending a Certain Text Message Will Force Anyone’s iPhone to Shut Down. A flaw in Apple’s iOS is allowing pranksters to remotely shut down other people’s phones. ………………….. Effective. PowerDown لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗 ℵαʊṧнα∂ ……………………… Some iPhone[…]
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|