Implementing two-factor authentication for remote access is a great way to keep attackers out of your network. Users’ credentials are floating all around the internet. But attackers can still get in your network through malware and other tools. In t…
Linux Systemd Vulnerability Enables DNS Attacks
Vulnerability in Linux systemd can trick a computer to execute malicious code or can trigger system crashes
Shadow Brokers Taunt and Blackmail NSA
Shadow Brokers provide promised exploits and leaked data at June’s end and promise more in July
Nato Confirms Cyber as Legitimate Military Domain
Attack on one member state is an attack on all
PwC: UK Councils Face Uphill Security Challenge
Just a third of local authority leaders confident in current approach
Kali Drones, Portable CTF Builds, Raspberry Pi Craziness and More!
The Kali community is a pretty crazy thing. There are folks all over the world doing interesting things with Kali Linux and far too often, these cool projects get overlooked. Part of the problem is that the community is spread out all over the ’n…
Ransomware Vaccine Now Available
“Vaccine” can be applied to Windows machines that haven’t yet been infected
Phishing and Social Engineering Cause Over Half of Cyber Incidents
Business Continuity Institute calls for better user education and improved collaboration
Maersk Confirms Ransomware Containment
Shipping and freight company Maersk has confirmed that it has contained the ransomware infection, and is working on a technical recovery plan
NHS Data Blunder “Put Over 1700 Patients at Risk”
Medical records were stockpiled by contractor rather than be sent to GPs, says NAO