+44 (0)203 88 020 88

Menu

Search

January 2019

coinbase cryptocurrency

Ethereum Classic hack raises blockchain questions

51% Attack succeeds and over $1million Ethereum Classic is double spent The cornerstone design assumption in blockchain systems such as Bitcoin and Ethereum is that there is a large community pool of honest participants who mutually concur and authenticate blockchain events.  Page 3 of Satoshi Nakamoto’s original whitepaper titled: “Bitcoin: A Peer-to-Peer Electronic Cash System” […]

Ethereum Classic hack raises blockchain questions Read More »

microchip vulnerability

Vulnerability in Wifi Chip used in Microsoft, Samsung and Sony devices allows zero click remote code execution  

Security research firm Embedi has recently published a report on the Marvell Avastar Wifi chip used in many devices including Microsoft Surface and Surface Pro, Samsung Chromebooks and some Samsung phones and the Sony Playstation 4 to name but a few. The flaw in Marvell’s implementation of the ThreadX operating system running on the Wifi

Vulnerability in Wifi Chip used in Microsoft, Samsung and Sony devices allows zero click remote code execution   Read More »

chromecast vulnerability upnp

Chromecast design flaw exposes digital signage screens to takeover

A recent publicity stunt promoting YouTube scoundrel pewdiepie has brought attention to a design flaw in Google Chromecast devices and smartTVs that embed the Chromecast technology.  By default, the Chromecast device will attempt to use Universal Plug and Play if it is enabled on the network router in order to open a port on the

Chromecast design flaw exposes digital signage screens to takeover Read More »

svg phishing attack fonts

New Phishing techniques avoid detection with fake web fonts

Endpoints and security gateway appliances use a variety of techniques to attempt to identify Phishing websites that are trying to steal login credentials from unsuspecting users. A typical phishing website may appear to the average human to be a login page for a well-known service, such as Gmail, Dropbox or your cloud-hosted ERP system.  Users

New Phishing techniques avoid detection with fake web fonts Read More »

ipmi server management

Server IPMI remote management cards used as ransomware attack vector

Many servers make use of Intel’s Intelligent Platform Management Interface (IPMI) cards. These allow system administrators to access and remotely manage the server; including, changing BIOS settings, rebooting the server and providing an out-of-band login to the local system console. The IPMI can be built into the motherboard or can be added later and is supported

Server IPMI remote management cards used as ransomware attack vector Read More »

0

No products in the basket.

No products in the basket.