Cloud Consultancy News
Manufacturing is Uniquely Vulnerable to Phishing Attacks
The manufacturing sector is number one when it comes to browser hacks, particularly from the dark world of phishing. When it comes to phishing attempts, the manufacturing industry is one of the most vulnerable sectors. In the recent report, 2020 State of Encrypted...
Password stealing and banking trojans have doubled in recent years
Criminals increase activities during back-to-school season, and Covid-19 also helping them out. (Image credit: Image source: Shutterstock/Ai825) Trojans that steal passwords and banking information from their victims have been constantly on the rise for the past two...
NHS Error Exposes Data on Hundreds of Patients and Staff
Hundreds of NHS patients and staff have had their personal data exposed to strangers after internal process failures, it has emerged this week. Human error at NHS Highland earlier this month led to the personal information of 284 patients with diabetes being shared...
A hacker is selling access to the email accounts of hundreds of C-level executives
A threat actor is currently selling passwords for the email accounts of hundreds of UK, EU & US C-level executives at companies across the world. The data is being sold on a closed-access underground forum for Russian-speaking hackers named Exploit.in. The threat...
Major BEC Phishing Ring Cracked Open with 3 Arrests
Some 50,000 targeted victims have been identified so far in a massive, global scam enterprise that involves 26 different malwares. Three men suspected of participating in a massive business email compromise (BEC) ring have been arrested in Lagos, Nigeria. A joint...
Using drones to improve 5G network security
The introduction of 5G will change the way we communicate, multiply the capacity of the information highways, and allow everyday objects to connect to each other in real time. Its deployment constitutes a true technological revolution not without some security...
Ransomware’s Brutal ‘Second Wave’
Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the confirmed death of a...
Does Apple Track Every Mac App You Run? OCSP Explained
Does your Mac really phone home to Apple each time you launch an app? That’s the allegation flying around after October 12, 2020, when an Apple server became slow and modern Macs took a long time to open apps. We’ll explain what’s going on. Info: This applies to...
Millions of WordPress sites hit in wide-ranging attack
A WordPress vulnerability present across millions of sites is being targeted by threat actors, according to security researchers. A number of the security bugs have only recently been patched, leaving a huge number of sites at risk. The security flaw in question...
What’s New in Outlook 365 for Mac’s Fall 2020 Update
Microsoft Outlook 365 received a nice update for Mac in the fall of 2020. Along with an enhanced look came new and improved features. With everything from a customizable toolbar and better search to the ability to snooze emails, let’s take a look at all that’s new in...