+44 (0)3453 888 327

Tag: IT security

The Cloud Computing experts

Adobe issues emergency Flash Player Fix

Adobe has released an emergency software patch for its Flash system after it found a serious vulnerability that was being exploited by hackers. The company has stated that it has had evidence of “limited, targeted attacks” and urged users to update their software straight away. Affecting Microsoft, Macintosh and Linux platforms, the company’s security bulletin…
Read more

MSpy hacked and data stolen

Mspy – a company that provides software that enables people to spy on the activity of others has been hacked.  Thousands of customer records are now available online. The mSpy software is targeted at parents who are worried about what their children are doing online, however the software is also used for more ethically questionable…
Read more

Google ignored security vulnerabilities

The security company ‘Security Explorations’ has uncovered what it claims are vulnerabilities in the Google App engines for Java. The team was able to bypass the existing Java security settings completely and the organisation has since released the full details of these flaws (including proof), after it has claimed that Google has ignored the security…
Read more

The increasing cost of Cyber crime

Unfortunately with today’s lifestyle Cyber crime really does pay. With the continuing development of digital goods and services, cyber-crime is estimated to reach $2.1 trillion (£1.3 trillion) by 2019. The latest results from Juniper research finds that through the rise of ransomware, threats are becoming more serious and could potentially be spread around more mobile…
Read more

Ad injection software: one in 20 infected

Google has recently announced a crackdown on software, removing deceptive and disruptive ad injection software extensions from its chrome web store. What is ad injection software? Ad injection software is also known as adware, which is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online. Google…
Read more

Self-destructing Rombertik virus strikes PCs

The virus infects computers while trying to avoid detection. If ‘Rombertik’s’ evasion techniques are triggered, it deletes key files on the computer making it consistently restart. Rombertik is known to propagate via phishing messages and spam, using social engineering tactics in order to entice users to download the content. Examples include sending emails that include…
Read more

Yahoo tests ear-based identification systems for smartphones

Yahoo is currently working on a method of unlocking your mobile phone through ear-print technology. Fingerprint scanners on mobile devices are increasingly popular, although they can be costly to manufacture. Yahoo is looking to use a phone’s touch screen to identify users and by looking into new methods of authentication, consequently technology prices will also…
Read more