Open Databases a Juicy Extortion Target
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks. Source: Cloud Security Open Databases a Juicy Extortion Target
This author has yet to write their bio.
Meanwhile lets just say that we are proud serviceteamit contributed a whooping 1043 entries.
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks. Source: Cloud Security Open Databases a Juicy Extortion Target
When talking about end-user device security, one of the questions I hear most often…
In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software…
What would life be like without traffic lights, mass-produced food, energy at the…
As we noted back in November, it’s common knowledge that keeping device software up…
One of the things that I (and many other cyber security people)…
Mozilla released its first Internet Health Report, examining the dangers of over-sharing eroding privacy, and the security of connected devices. Source: Infrastructure Security Mozilla’s First Internet Health Report Tackles Security, Privacy
Insecure Hadoop and CouchDB installations are the latest attack targets of cybercriminals who are hijacking and deleting stolen data. Source: Cloud Security Hadoop, CouchDB Next Targets in Wave of Database Attacks
Carbanak has surfaced again with new campaigns using Google hosted services such as Forms and Sheets as command and control channels. Source: Cloud Security Carbanak Using Google Services for Command and Control
Helping people and businesses to stay safe online through safe and secure passwords…
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.