Cloud Consultancy News
Attackers infected radio giant Entercom with ransomware and demanded ransom payment of $500,000
The infection spread through other internal digital systems including email systems, music scheduling, production, billing, and shared network drives. This incident has forced some radio stations to complete music logs manually and run without commercials. What’s the...
Security hole opens a billion Android users to advanced SMS phishing attacks
Check Point Research has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The affected Android phones use over-the-air (OTA) provisioning, which allows mobile network...
Attackers are exploiting vulnerable WP plugins to backdoor sites
A group of attackers that has been injecting WordPress-based sites with a script redirecting visitors to malicious and fraudulent pages has now also started backdooring the vulnerable installations, Wordfence’s Mikey Veenstra warns. The attacks The attackers are...
Firefox now blocks third-party tracking cookies, cryptomining scripts by default
It took a lot of testing and tweaking, but Mozilla’s Firefox browser is finally being delivered with Enhanced Tracking Protection and a web-based cryptomining blocking feature on by default. The changes “Enhanced Tracking Protection works behind-the-scenes to keep a...
A look into the frequency and success of phishing attacks on SMEs
43% of UK SMEs have experienced a phishing attempt through impersonation of staff in the last 12 months. Of those impersonation phishing attempts, it was discovered that two-thirds (66%) had suffered a successful attack, according to CybSafe. Businesses admitted to...
September 2019 Patch Tuesday forecast: Microsoft security update will be complete
Microsoft began an aggressive six-month campaign in March of this year to switch the digital signature on all operating system and product updates from using Secure Hash Algorithm 1 (SHA-1) to SHA-2. This required installing the current SHA-2 algorithms in all the...
Windows 10 is getting a macOS-like cloud OS restore feature
Microsoft is planning to improve the way you reset or refresh a Windows 10 PC. The company has revealed it’s testing a new “cloud download” feature for resetting Windows 10 when hardware fails or the OS needs reinstalling. While the feature isn’t available for public...
Apple’s AirDrop and password sharing features can leak iPhone numbers
Apple makes it easy for people to locate lost iPhones, share Wi-Fi passwords, and use AirDrop to send files to other nearby devices. A recently published report demonstrates how snoops can capitalize on these features to scoop up a wealth of potentially sensitive data...
Microsoft Azure now lets you have a server all to yourself
Microsoft yesterday announced the preview launch of Azure Dedicated Host, a new cloud service that will allow you to run your virtual machines on single-tenant physical services. That means you’re not sharing any resources on that server with anybody else and you’ll...
What the education industry must do to protect itself from cyber attacks
Data breaches show no signs of slowing down and companies across many industry verticals fall victim to what now seems to be a regular occurrence. Most attention around data breaches is on the commercial side, with Capital One being the recent high-profile breach,...