Recognising and Avoiding Phishing Attacks

Have you ever received a dodgy email? One that’s from an account you didn’t recognise, or someone asking you for details they wouldn’t normally ask for, or an email with an odd link? Chances are that it was a phishing email. Hackers and scammers alike have been using these for years to try and gain…

CISCO Mega-Vulnerability

On January 29th Cisco released a high-urgency security alert. Firewalls, security appliances, and other devices configured with WebVPN clientless VPN software are vulnerable to an internet based attack that allows an attacker to gain full control of your cisco device. The affected systems include: * 3000 Series Industrial Security Appliance (ISA) * ASA 5500 Series…

Big Flash Bug – Update Adobe Flash IMMEDIATELY

A brand new Flash bug has been used to infect PC’s. A zero-day bug is one announced with zero notice to the vendor. Normally security researchers give Adobe time to fix their software before announcing the bug’s details, but not this time.   The zero-day affects Flash Player installs 28.0.0.137 and earlier. The current version…

Yet another HP Keylogger

Previously, Hewlett Packard had a keylogger embedded in their audio driver and now there’s one found in their synaptics keyboard driver. This driver can be found on most modern HP laptops. Vulnerability Details Security researcher Michael Myung discovered the keylogging code in the keyboard driver while trying to control the keyboard back-light. The code looks for…