Serviceteam IT Security News

Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS

Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead...
Serviceteam IT Security News

Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim

Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to...
Serviceteam IT Security News

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

After an Alexa speaker recorded and shared a private conversation, the tech community...
Serviceteam IT Security News

What Will GDPR’s Impact Be On U.S. Consumer Privacy?

GDPR may be going in effect Friday, but U.S. citizens have a ways...
Serviceteam IT Security News

Of mice and cyber

What’s the difference between a combustion engine and a mouse? (no this isn't...
Serviceteam IT Security News

Ahead of GDPR, Information Governance Comes into Its Own

A full 98 percent of US enterprises have embarked on information governance (IG)...
Serviceteam IT Security News

Researchers Say More Spectre-Related CPU Flaws On Horizon

Yet another speculative execution side channel flaw has been disclosed in processors -...
Serviceteam IT Security News

Six Vulnerabilities Found in Dell EMC’s Disaster Recovery System, One Critical

A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a...
Serviceteam IT Security News

Intel Responds to Spectre-Like Flaw In CPUs

Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative...
Serviceteam IT Security News

Countdown to GDPR

Anybody who is involved in cyber security or data protection will be acutely...
Serviceteam IT Security News

Wicked Botnet Uses Passel of Exploits to Target IoT

The code is integrated with at least three exploits that target unpatched IoT...
Serviceteam IT Security News

EUD Security Guidance: Windows 10 with Mobile Device Management

About this guidance This ALPHA guidance describes how to securely manage Windows 10 Desktop...
Serviceteam IT Security News

GDPR Security Outcomes

This guidance describes a set of technical security outcomes that are considered to...
Serviceteam IT Security News

Cisco Warns of Three Critical Bugs in Digital Network Architecture Platform

The company urges customers to patch three vulnerabilities that received the highest severity...
Serviceteam IT Security News

One Year After WannaCry: A Fundamentally Changed Threat Landscape

Threatpost talked to several security researchers about what's changed in the past year....
Serviceteam IT Security News

Critical Linux Flaw Opens the Door to Full Root Access

The vulnerability allows an attacker to execute a malware or other payloads on...
Serviceteam IT Security News

Phishing, spear phishing and whaling; does it change the price of phish?

The NCSC - in collaboration with CPNI - has recently published guidance on avoiding...
Serviceteam IT Security News

Avoid scoring a cyber security own goal this summer

This blog signposts to existing advice put together to answer any general...
Serviceteam IT Security News

Increased Cyber Threats: Security steps to take

This guidance outlines the security steps that your organisation should take in response...
Serviceteam IT Security News

Attackers Use UPnP to Sidestep DDoS Defenses

Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations....
Serviceteam IT Security News

Spray you, spray me: defending against password spraying attacks

One common way that online accounts are breached is through password spraying, whereby lists...
Serviceteam IT Security News

GDPR Phishing Scam Targets Apple Accounts, Financial Data

A phishing scam fooled victims by claiming to be Apple and scooping up...
Serviceteam IT Security News

Bugs in Logitech Harmony Hub Put Connected IoT Devices at ‘High Risk’

Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light...
Serviceteam IT Security News

Secrets of the Wiper: Inside the World’s Most Destructive Malware

The actors behind this kind of code, whether they’re bent on sending a...
Serviceteam IT Security News

Generic application development guidance

This guidance provides advice on how to minimise the loss of data from...
Serviceteam IT Security News

Apple iOS application development guidance

This guidance contains recommendations for the secure development, procurement and deployment of iOS applications. Please familiarise yourself with the generic application...
Serviceteam IT Security News

Google Project Zero Calls Windows 10 Edge Defense ‘ACG’ Flawed

Researchers maintain Microsoft’s vaunted Arbitrary Code Guard in the Edge browser can’t stop...
Serviceteam IT Security News

Application development collection

This guidance provides advice on how to minimise the loss of data from...
Serviceteam IT Security News

Android application development guidance

This guidance contains recommendations for the  secure development, procurement and deployment of Android applications. Please familiarise yourself with the generic application...
Serviceteam IT Security News

Major OS Players Misinterpret Intel Docs, and Now Kernels Can Be Hijacked

Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation...