Apple Offers Free Replacements / Repairs On Butterfly Keyboards

After numerous complaints over the last two years and even an online petition by a customer, Apple has decided to offer free repairs or replacements for the butterfly keyboard on its MacBook and MacBook Pro laptops. What Happened? For quite some time now, some MacBook and MacBook Pro laptop users have been complaining about problems […]

Continue reading


1 – 0 In England Vs World Cup Hackers

It has been reported that the England football team have been briefed before flying out to their World Cup base in St Petersburg about how they and UK fans can avoid falling victim to Russian hackers. NCSC Advice The briefing has been delivered by The National Cyber Security Centre (NCSC), which is part of GCHQ. […]

Continue reading


Efail – Encryption Flaw

A German newspaper has released details of a security vulnerability, discovered by researchers at Munster University of Applied Sciences, in PGP (Pretty Good Privacy) data encryption. What Is PGP? PGP (Pretty Good Privacy) is an encryption program that is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and disk partitions, and to increase […]

Continue reading


GDPR: Don’t Get Caught Out By Your Logfiles

With all the focus on the more visible elements of GDPR compliance ahead of the Regulation’s introduction of May 25th, one EU Working group is warning businesses not to forget what’s stored in the logfiles of their Internet-facing servers. What Are Logfiles and Why Should We Care? Logfiles record either events that occur in an […]

Continue reading


Russia Suspected of Hacking Campaign

The UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security have warned that Russia may be behind a broad hacking offensive targeting millions of machines that direct data around the net. Networking Equipment Targeted US and UK security agencies have issued a joint internet security alert warning and have […]

Continue reading


Phishing Attack Simulator: Microsoft Goodies

Microsoft has announced a set of business security tools, including a phishing attack simulator, that make it easier and more affordable for businesses to identify and fix vulnerabilities before they become an issue. Attack Simulator One of the key tools announced to coincide with the annual RSA conference in San Francisco, is the Attack Simulator. […]

Continue reading


New MacOS Backdoor Linked to OceanLotus Found – TrendLabs Security Intelligence Blog

Trend micro recently discovered a backdoor in Mac OSX. The MacOS backdoor was found in a malicious Word document presumably distributed via email. The document bears the filename “2018-PHIẾU GHI DANH THAM DỰ TĨNH HỘI HMDC 2018.doc,” which translates to “2018-REGISTRATION FORM OF HMDC ASSEMBLY 2018.doc.” The document claims to be a registration form for […]

Continue reading


New macOS Too Secure?

The new security called ‘System ‘Integrity Protection’ (SIP) behind macOS High Sierra is proving so secure that it appears to be stopping users from being able to delete (third-party) apps with ease. What’s The Issue? The process behind the SIP was first introduced to users during the ‘El Capitan’ version of macOS (10.11) in late […]

Continue reading