Cloud Consultancy News
New macOS zero-day allows theft of user passwords
A German security researcher has published a video over the weekend showing a new zero-day affecting Apple's macOS desktop operating system. In an interview to German tech site Heise, Linus Henze, the security researcher, says the vulnerability allows a malicious app...
Multiple vulnerabilities in RDP can allow attackers to take control of computers
- These flaws in the Remote Desktop Protocol (RDP) can result in the so-called ‘reverse RDP attack’ - There are a total of 25 security issues in the RDP Security researchers have discovered multiple vulnerabilities in the Remote Desktop Protocol (RDP) that can result...
This password-stealing phishing attack comes disguised as a fake meeting request from the boss
A widespread phishing campaign is targeting executives across a number of industries with messages asking to reschedule a board meeting in an effort to steal logins and passwords. Spotted by researchers at security firm GreatHorn, the phishing messages spoof the name...
More Money, More Worries About Cyber Risk
Executives at financial services companies are increasingly concerned about risks, but as technology becomes more integrated in managing financials, more executives say that cybersecurity is increasingly becoming the most important type of risk, according to a new...
New Mac malware steals cookies, cryptocurrency and computing power
A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. Dubbed CookieMiner on account of its cookie-stealing capabilities, this newly discovered malware is believed to be...
Out-Of-Date Applications Are Putting PC Users At Risk
New research from Avast has revealed that more than half (55 percent) of PC applications installed worldwide are out-of-date, leaving users and their personal data vulnerable to security risks. The firm's PC Trends Report 2019 found that users are making themselves...
83% Of Global Respondents Experienced Phishing Attacks In 2018
The firm Proofpoint analysed data from tens of millions of simulated phishing attacks sent over a one-year period, along with nearly 15,000 cybersecurity professional survey responses, to provide an in-depth look at state of global phishing attacks. Overall, 83...
DNS RED FLAG DAY – 1st February 2019 – Check Your Website Compatibility Now
The current DNS is unnecessarily slow and inefficient because of efforts to accommodate a few DNS systems that are not in compliance with DNS standards established two decades ago. To ensure further sustainability of the system it is time to end these accommodations...
What is 5G?
The 5G band is the next generation of broadband connection being rolled out by wireless mobile carriers globally. It will replace the existing standard, 4G LTE. While carriers upgrade existing network equipment to 5G, it will live alongside your 4G mobile wireless...
Can You Spot When You’re Being Phished?
Identifying phishing can be harder than you think. Alphabet subsidiary Jigsaw has made a quiz with Google to test your phishing awareness skills. To make this quiz, the team drew from materials they've used to train thousands of journalists, political figures and...