The recent news that the Reuters News Agency's blog has been compromised for the third time in a month has got me wondering exactly what process the administrators went through after the first attack. (more…)

The recent article in Wired Magazine (http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/) relating to a sophisticated attack against a specific individual that led to the closure of their GMail Account, compromise of their Twitter account, Amazon Account and Apple iCloud Service (which the attacker then used to wipe the data from the victim's iPhone, iPad and Mac), highlights the need for strong multi-factor authentication. (more…)

The recent attack on, and compromise of LinkedIn and their password data has highlighted the need for strong authentication practices, and a lack of awareness among certain developers of security best-practice. (more…)

A couple of days ago, you may have noticed that our website was offline. The site itself was still running (the servers were still up), it was just that our domain registrar, 123-reg had suffered a Distributed Denial of Service (DDoS) atttack, which they attempted to stop by making various changes to their core network configuration. (more…)

I had an interesting experience last week - I was asked if I could help someone figure out their wireless network key. I started thinking that I would need to crack the key (as they couldn't remember it, and didn't have it recorded anywhere), then I thought "it's probably stored in the administration interface somewhere, and that would be the best place to look", so I told them to access the admin interface and look for the key. (more…)

We take the pain out of IT and Cyber Security

Contact us today to cure your IT & Cyber Security headache

Tell us about your Issues
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram