Bastille MouseJack

Bastille MouseJack

Logitech issued the following statement in response to a report on Logitech’s Unifying receiver. The Unifying receiver allows a user to connect multiple compatible keyboards and mice to a laptop or desktop computer with a single USB receiver. Asif Ahsan, senior director, engineering at Logitech have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Asif Ahsan, […]

Fixes Critical Flaws Affecting Every Version of Windows

Fixes Critical Flaws Affecting Every Version of Windows

Yesterday’s Patch Tuesday release fixes critical flaws affecting every version of Windows. This month’s bumper release of security patches has one bulletin that affects every supported version of Windows. Craig Young, security researcher at Tripwire explains that the March bulletin should generally be straightforward to patch. Additionally, I have pasted some research into enterprise patch […]

97% of FTSE 250 Companies are Exposing Customers to Risks of Phishing Attacks

97% of FTSE 250 Companies are Exposing Customers to Risks of Phishing Attacks

A shocking 97% of FTSE 250 companies are not adequately protecting their customers against phishing attacks, according to a new industry report from Cyber Security Partners (CSP). The findings reveal that only 17 companies in the FTSE 250 are using the DMARC standard to prevent email scams which enable theft of customer passwords, bank accounts, […]

Second Draft of the Investigatory Powers Bill

Second Draft of the Investigatory Powers Bill

Following the publication of the second draft of the Investigatory Powers Bill, techUK has pulled together a summary of the changes that have been made. These relate to recommendations made by the three committees that scrutinised the bill. Privacy Committee recommendations: The Intelligence & Security Committee called for an entire section of the Bill dedicated […]

Oracle TNS Listener Poison Attack

Oracle TNS Listener Poison Attack

A flaw in the Oracle database listener, if not mitigated, could allow an attacker to take complete control of an Oracle database through an attack known as TNS Poison Attack. This vulnerability is remotely exploitable without authentication credentials. This classic man-in-the-middle (MITM) vulnerability has been published as security alert CVE 2012-1675 and received a CVSS […]