A quick guide to avoiding phishing.

Keeping your data secure is a challenge for all business. Small and Large. In light the recent events that have triggered the loss of data to ransomware, please keep in mind the following simple but effective steps to avoid losing data: Watch out for scam email. Fraudsters are getting more sophisticated by the day, making you take a second and … Read More

Google Project Zero reveals critical flaws in CPU architectures.

Google’s security researchers with the now famous Project Zero, disclosed yesterday two vulnerabilities, named Meltdown and Spectre. Even as the new year starts, this could be 2018’s largest vulnerability discovery, as it affects all software running on Intel processors, regardless of Operating System. Basically, every Intel processor after 1995 is affected. The vulnerability exploits “out of order execution” The large group of researchers collaborated from … Read More

Vulnerable: Intel Management Engine, Server Platform Services and Trusted Execution Engine.

Intel has released a security notice regarding its ME, SPS and TXE platforms. These vulnerabilities provide an entry point at the firmware level, allowing malicious high privilege process to run code and programs before the Operating System. The vulnerability is also exposed remotely. Affected Chipsets Include: Intel Core Processors 6th, 7th, and 8th Generation Intel Xeon E3-1200 V6 and V5 Intel Xeon Scalable … Read More

Windows 10 Fall Creators Update: New Microsoft 365 security and management features available.

The recently released Windows 10 Fall Creators update has new features not only for regular users but for business and enterprise deployments as well. Microsoft has recently reported that their latest operating system update is active on more than 500 million “monthly active devices, and continues to gain momentum”. With Enterprise being a critical market segment interest for Microsoft,  here are some … Read More

Key Reinstallation Attacks: WPA2 encryption.

Yesterday, October 16, 2017, two Belgian researchers published a proof of concept of a vulnerability in the current implementation of WPA2 (Wi-Fi Protected Access II), rendering all modern networking devices exposed. Affected Implementations include: Apple OS X 10.9.5 Apple MacOS Sierra 10.12 Apple iOS 10.3.1 Google Android 6.0 Open BSD 6.1 Microsoft Windows 7, Windows 10 This technique allows attackers to view … Read More

Key Reinstallation Attacks: Ubiquiti Devices.

Ubiquity has undoubtedly been one of the first and fastest to Patch the  WPA2 Vulnerability. However, the process is not without its hiccups. Talking to Ubiquiti Networks a moment ago we confirmed that there is an issue if you attempt to use UniFi Controller to update the firmware. The issue in question is that the controller will be stuck on the … Read More