T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…

Read More

When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…

Read More

Andrew Auernheimer, the US “hacktivist” who broke into the network of AT&T said that the attack was done to highlight security failings. Its reported that Andrew Auernheimer aka Weev and Daniel Spitler stole email addresses from 120,000 iPad owners by exploiting a bug in the way AT&T set up its network. Due to this, Auernheimer…

Read More

Despite large scale security measures implemented globally thousands of unsecured SCADA systems have been discovered by security researchers in Finland. Testing last January revealed 2, 915 exposed systems running operations such as building automation, transport and water supply. Researchers from Aalto University looked at  responses from 185,000 Finnish IP addresses that hosted HTTP servers. They…

Read More

A computer network generating millions of fake advert viewings has been discovered by British web analytics firm Spider.io. The network nicknamed “Chameleon” is made up of 120,000 home pc’s and costs advertisers around $6m per month. Spider.io reports that Chameleon simulated clicks on adverts on over 200 sites and said the botnet was responsible for up to nine…

Read More