Call us today on: +44 (0)203 88 020 88
SecureTeamSecureTeamSecureTeamSecureTeam
  • Home
  • Our Services
    • Infrastructure Testing
      • Internal Network Penetration Test
      • External Network Penetration Test
      • Wireless Network Penetration Test
      • Vulnerability Assessment
      • Network Segregation Test
      • Voice over IP (VoIP) Penetration Test
    • Application Testing
      • Web Application Penetration Test
      • Mobile Application Penetration Test
      • Desktop Application Security Assessment
      • Citrix Breakout Test
    • Configuration Review
      • Windows Server Build Review
      • Linux Server Build Review
      • Citrix Configuration Review
    • Information Assurance
      • ISO 27001 Gap Analysis
    • Cyber Essentials
  • News
  • Articles
  • About
    • About SecureTeam
    • STORM Appliances
      • Installing a STORM Device
      • Returning a STORM Device
    • White-Label Consultancy
    • Jobs
    • Cookie Policy
    • Quality Policy
    • Security Policy
    • Privacy Notice
    • Website Terms & Conditions
  • Contact Us

Blog

Home 2021 June

What’s new in CIS Controls v8?

By Mark Faithfull | Articles, Information Assurance | 23 June, 2021 | 0

The world has changed, and the CIS Controls have evolved to reflect those changes.  The increased use of cloud computing, remote working, virtualisation, and outsourcing have all redefined and blurred the edges of the corporate network.  The latest version 8 of the CIS Controls provides a practical framework for organisations of all sizes to identifyRead more

How Poor Library Hygiene Compromises your Application Security

By Mark Faithfull | News | 23 June, 2021 | 0

Modern software development makes extensive use of open-source libraries that save development time and money. However, 79% of developers fail to keep those libraries up to date leaving their code vulnerable to newly discovered flaws and vulnerabilities. A new report from testing firm Veracode reveals some worrying trends that Security Managers should discuss with theirRead more

iOS WiFi crashes with malicious hotspot name

By Mark Faithfull | News, Vulnerabilities | 23 June, 2021 | 0

iPhone users should beware after a bug is disclosed that can disable the WiFi system simply by connecting to a hotspot with a specially crafted name. The bug in iOS results from a poorly sanitised input string (Improper Input Validation) and in this case it was a failure to remove escape sequences from the input.Read more

Ransomware is key cyber threat to UK businesses

By Mark Faithfull | News, Tools | 18 June, 2021 | 0

The CEO of the UK’s National Cyber Security Centre, part of GCHQ, says that the main threat facing UK businesses and consumers is ransomware coming from cyber criminals. This week Lindy Cameron delivered the Annual Security Lecture to the Royal United Services Institute where she stated that: For most UK citizens and businesses, and indeedRead more

Google Chrome 0Day RCE Fixed

By Mark Faithfull | News, Vulnerabilities | 18 June, 2021 | 0

Google is rolling out a new version of their Chrome web browser that fixes a remote code execution vulnerability that is under attack in the wild – the seventh zero day in Chrome so far this year. The new version of Chrome (91.0.4472.114) on Linux, Windows, and Mac resolves four high severity vulnerabilities including CVE-2021-30554Read more

How To Become An Ethical Hacker

By Mark Faithfull | Articles, Cyber Essentials, Social Engineering | 15 June, 2021 | 3

Everyone has heard of hacking, but not many will know of its less-sinister counterpart, ethical hacking. Rather than the image of an evil villain breaking into important software in a dingy basement, imagine someone working alongside important companies and training them in techniques to prevent malicious attacks to their system. Ethical hacking is quickly becomingRead more

The Ultimate Expert Guide To Password Security

By Mark Faithfull | Articles, Cyber Essentials | 15 June, 2021 | 2

Passwords are the keys and locks to everything in our digital lives, which is why it is so important that they are strong and safe. However, password strength is still an ongoing problem, with many people using weak or common passwords and using the same password for multiple accounts.  Here at SecureTeam, we have extensiveRead more

iOS vs Android: Which Is More Secure?

By Mark Faithfull | Articles, Web Applications | 15 June, 2021 | 6

There are big differences between iOS and Android mobile platforms, especially in how they attempt to mitigate cybersecurity threats. For years, iOS has enjoyed the reputation as the most secure mobile operating system; however, recent changes are allowing Android to make some headway and close the gap between the two.  You can never be completelyRead more

Online Safety For Kids

By Mark Faithfull | Articles, Cyber Essentials, Social Engineering | 15 June, 2021 | 0

Early use of digital technology has been shown to improve language skills in young children, as well as helping to promote their creativity and social development. However, it’s not without risks. Threats to children online include cyberbullying and harassment, invasions of privacy, exposure to inappropriate content and dangerous sexual online activities.  You might be askingRead more

What is Zero Trust Security?

By Mark Faithfull | Articles, Infrastructure | 11 June, 2021 | 1

Understanding the principles of Zero Trust Security will help Security and Network Managers evolve their network design to better defend against new and emerging cyber security threats and increased remote working. To understand and appreciate the benefits of the Zero Trust approach, we need to consider the limitations of more traditional network designs that ZeroRead more

12

Recent Posts

  • ZuoRAT Malware Targets Home-Office Routers
  • Microsoft Patches Linux Cluster Bug
  • Log4Shell (still) actively exploited on VMware Systems
  • Vulnerability reported on QNAP NAS Devices
  • How the Phone-Wiping Banking Trojan BRATA is Becoming a More Advanced Threat

Recent Comments

    Archives

    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • July 2018
    • June 2018
    • April 2018
    • January 2018
    • October 2017
    BCS Cyber Essentials Cyber Essentials Cyber Essentials PLUS ISO 9001 ISO 27001
    information. secured.
    • Home
    • Our Services
      • Infrastructure Testing
        • Internal Network Penetration Test
        • External Network Penetration Test
        • Wireless Network Penetration Test
        • Vulnerability Assessment
        • Network Segregation Test
        • Voice over IP (VoIP) Penetration Test
      • Application Testing
        • Web Application Penetration Test
        • Mobile Application Penetration Test
        • Desktop Application Security Assessment
        • Citrix Breakout Test
      • Configuration Review
        • Windows Server Build Review
        • Linux Server Build Review
        • Citrix Configuration Review
      • Information Assurance
        • ISO 27001 Gap Analysis
      • Cyber Essentials
    • News
    • Articles
    • About
      • About SecureTeam
      • STORM Appliances
        • Installing a STORM Device
        • Returning a STORM Device
      • White-Label Consultancy
      • Jobs
      • Cookie Policy
      • Quality Policy
      • Security Policy
      • Privacy Notice
      • Website Terms & Conditions
    • Contact Us
    SecureTeam