A new vulnerability was found in Intel CPU’s that could allow hackers to gain access to sensitive data in a computer’s memory Accorind to a ZDNet report, the flaw, which Intel has called “L1 Terminal Fault” and researchers have grouped under the moniker “Foreshadow” are similar to both the Spectre and Meltdown vulnerabilities that were […]
read moreMeltdown And Spectre
The Meltdown and Spectre flaws—two related vulnerabilities that enable a wide range of information disclosure from every mainstream processor, with particularly severe flaws for Intel and some ARM chips—were originally revealed privately to chip companies, operating system developers, and cloud computing providers. That private disclosure was scheduled to become public some time next week, enabling […]
read moreRansomware prevention best practices
In an attempt to educate our users against the dangers of ransomware we have come up with a Ransonmare Prevention Best Practices guide. We have written about ransomware in the past outlining the way ransomware is quickly spreading around the world. See Ransomware By Numbers. Without a good plan in place handling the aftermath of […]
read moreRansomware by Numbers
2016 saw ransomware run rampant across the globe, with more sophisticated attacks than ever before. Changes to ransomware variants now include total disk encryption as well as network aware scanning able to target shares on remote computers. A report by Kasperksy labs for 2016 has seen the main focus on ransomware variants throughout the year […]
read moreRansomware – Prevention of data loss
This guide should offer some tips for the prevention of data loss through ransomware. Picture this: You’ve spent the last few weeks working on an important project gathering and compiling inforation from a wide array of sources. When you finally finish the project, you go to copy the file onto a DVD and what the? […]
read more