Apple Apps Taken Down For Spying

The Mac App Store has taken down a number of well known security apps for the Apple Mac after it was discovered that they are being used to spy on the browsing habits of their users. Which Apps? It has been reported that Dr Unarchiver, Dr Cleaner, Adware Medic, Adware Doctor and App Uninstall have […]

Continue reading


Businesses Set For Augmented Reality

A report based on research by IT Consultancy Group Capgemini has predicted a big shift towards the use of virtual reality and augmented reality by businesses over the next 3 years. Mainstream Soon The results of a survey of 700 business executives across multiple sectors show that 46% think that VR and AR technologies will […]

Continue reading


IBM Makes Test Version of New Stealth AI Malware ‘DeepLocker’

IBM has announced that it has created its own stealth, ultra-evasive AI malware called ‘DeepLocker’ that can evade all traditional cyber-security protection, hide in normal applications, and only strike when it is sure it has reached its intended target. Why? Cyber-criminals are becoming ever-more sophisticated in their methods, and the resources available to them have […]

Continue reading


Apple Offers Free Replacements / Repairs On Butterfly Keyboards

After numerous complaints over the last two years and even an online petition by a customer, Apple has decided to offer free repairs or replacements for the butterfly keyboard on its MacBook and MacBook Pro laptops. What Happened? For quite some time now, some MacBook and MacBook Pro laptop users have been complaining about problems […]

Continue reading


1 – 0 In England Vs World Cup Hackers

It has been reported that the England football team have been briefed before flying out to their World Cup base in St Petersburg about how they and UK fans can avoid falling victim to Russian hackers. NCSC Advice The briefing has been delivered by The National Cyber Security Centre (NCSC), which is part of GCHQ. […]

Continue reading


Efail – Encryption Flaw

A German newspaper has released details of a security vulnerability, discovered by researchers at Munster University of Applied Sciences, in PGP (Pretty Good Privacy) data encryption. What Is PGP? PGP (Pretty Good Privacy) is an encryption program that is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and disk partitions, and to increase […]

Continue reading


GDPR: Don’t Get Caught Out By Your Logfiles

With all the focus on the more visible elements of GDPR compliance ahead of the Regulation’s introduction of May 25th, one EU Working group is warning businesses not to forget what’s stored in the logfiles of their Internet-facing servers. What Are Logfiles and Why Should We Care? Logfiles record either events that occur in an […]

Continue reading


Russia Suspected of Hacking Campaign

The UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security have warned that Russia may be behind a broad hacking offensive targeting millions of machines that direct data around the net. Networking Equipment Targeted US and UK security agencies have issued a joint internet security alert warning and have […]

Continue reading


Phishing Attack Simulator: Microsoft Goodies

Microsoft has announced a set of business security tools, including a phishing attack simulator, that make it easier and more affordable for businesses to identify and fix vulnerabilities before they become an issue. Attack Simulator One of the key tools announced to coincide with the annual RSA conference in San Francisco, is the Attack Simulator. […]

Continue reading


New MacOS Backdoor Linked to OceanLotus Found – TrendLabs Security Intelligence Blog

Trend micro recently discovered a backdoor in Mac OSX. The MacOS backdoor was found in a malicious Word document presumably distributed via email. The document bears the filename “2018-PHIẾU GHI DANH THAM DỰ TĨNH HỘI HMDC 2018.doc,” which translates to “2018-REGISTRATION FORM OF HMDC ASSEMBLY 2018.doc.” The document claims to be a registration form for […]

Continue reading