Serviceteam IT Security News

Facebook Defends Against Device-Integrated APIs Policy

Facebook is again in hot water after an article alleged it struck deals...
Serviceteam IT Security News

Three random words or #thinkrandom

You're probably aware that there’s a lot of guidance out there on what...
Serviceteam IT Security News

Public Google Groups Leaking Sensitive Data at Thousands of Orgs

The exposed information includes accounts payable and invoice data, customer support emails, password-recovery...
Serviceteam IT Security News

Honda, Universal Music Group Expose Sensitive Data in Misconfig Blunders

The Honda mistake affects 50,000 users of the Honda Connect App, while UMG...
Serviceteam IT Security News

ICANN Launches GDPR Lawsuit to Clarify the Future of WHOIS

WHOIS, the searchable "phonebook" of contact data for internet domains, may violate GDPR...
Serviceteam IT Security News

Bug In Git Opens Developer Systems Up to Attack

A serious vulnerability was patched by developers behind Git that closes the door...
Serviceteam IT Security News

Fraudsters Claim To Hack Two Canadian Banks

Two Canadian banks reported that they may be targets of a hack after...
Serviceteam IT Security News

SEVered Attack Extracts the Memory of AMD-Encrypted VMs

Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that...
Serviceteam IT Security News

Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS

Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead...
Serviceteam IT Security News

Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim

Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to...
Serviceteam IT Security News

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

After an Alexa speaker recorded and shared a private conversation, the tech community...
Serviceteam IT Security News

What Will GDPR’s Impact Be On U.S. Consumer Privacy?

GDPR may be going in effect Friday, but U.S. citizens have a ways...
Serviceteam IT Security News

Of mice and cyber

What’s the difference between a combustion engine and a mouse? (no this isn't...
Serviceteam IT Security News

Ahead of GDPR, Information Governance Comes into Its Own

A full 98 percent of US enterprises have embarked on information governance (IG)...
Serviceteam IT Security News

Researchers Say More Spectre-Related CPU Flaws On Horizon

Yet another speculative execution side channel flaw has been disclosed in processors -...
Serviceteam IT Security News

Six Vulnerabilities Found in Dell EMC’s Disaster Recovery System, One Critical

A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a...
Serviceteam IT Security News

Intel Responds to Spectre-Like Flaw In CPUs

Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative...
Serviceteam IT Security News

Countdown to GDPR

Anybody who is involved in cyber security or data protection will be acutely...
Serviceteam IT Security News

Wicked Botnet Uses Passel of Exploits to Target IoT

The code is integrated with at least three exploits that target unpatched IoT...
Serviceteam IT Security News

EUD Security Guidance: Windows 10 with Mobile Device Management

About this guidance This ALPHA guidance describes how to securely manage Windows 10 Desktop...
Serviceteam IT Security News

GDPR Security Outcomes

This guidance describes a set of technical security outcomes that are considered to...
Serviceteam IT Security News

Cisco Warns of Three Critical Bugs in Digital Network Architecture Platform

The company urges customers to patch three vulnerabilities that received the highest severity...
Serviceteam IT Security News

One Year After WannaCry: A Fundamentally Changed Threat Landscape

Threatpost talked to several security researchers about what's changed in the past year....
Serviceteam IT Security News

Critical Linux Flaw Opens the Door to Full Root Access

The vulnerability allows an attacker to execute a malware or other payloads on...
Serviceteam IT Security News

Phishing, spear phishing and whaling; does it change the price of phish?

The NCSC - in collaboration with CPNI - has recently published guidance on avoiding...
Serviceteam IT Security News

Avoid scoring a cyber security own goal this summer

This blog signposts to existing advice put together to answer any general...
Serviceteam IT Security News

Increased Cyber Threats: Security steps to take

This guidance outlines the security steps that your organisation should take in response...
Serviceteam IT Security News

Attackers Use UPnP to Sidestep DDoS Defenses

Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations....
Serviceteam IT Security News

Spray you, spray me: defending against password spraying attacks

One common way that online accounts are breached is through password spraying, whereby lists...
Serviceteam IT Security News

GDPR Phishing Scam Targets Apple Accounts, Financial Data

A phishing scam fooled victims by claiming to be Apple and scooping up...