WADA Urged To Remain Vigilant For Malicious Activity Following Russia Ban, Cyber Experts Warn

In light of WADA’s sporting ban of Russia, cyber security experts at ThreatConnect have warned that WADA itself, as well as the likes of FIFA and the IOC, must remain vigilant for potential malicious activity over the coming months. ThreatConnect has tracked Russian actors over the last several years, and found efforts to target WADA, and other organisations, […]

Comment: iOS Bug In AirDrop Let Anyone Temporarily Lock-up Nearby iPhones

CIOs need to enable cloud technologies

It has been reported that Apple has fixed a bug in iOS 13.3, out yesterday, which let anyone temporarily lock users out of their iPhones and iPads by forcing their devices into an inescapable loop. Kishan Bagaria found a bug in AirDrop, which allows users to share files between iOS devices. He found the bug let him repeatedly send files to […]

Comment: Connected Toys Identified With Serious Security Flaws

Security Issues with Connected Toys

It has been reported that a range of connected toys available on the high street and online have been found to include serious security flaws which could put children at risk of exposure to strangers and inappropriate content. That is the conclusion of research from consumer group Which? after testing of a series of popular ‘smart’ toys fitted with internet […]

Plundervolt’s New Attack Affects Intel CPUs – Expert Comments

A new Plundervolt attack is impacting Intel CPUs, an expert from KnowBe4 offers perspective. “Modern processors are being pushed to perform faster than ever before – and with this comes increases in heat and power consumption. To manage this, many chip manufacturers allow frequency and voltage to be adjusted as and when needed. But more […]

Experts Comments: Office365 Accounts Compromised Using OAuth

A recently discovered phishing campaign uses a novel approach to infiltrating Office365 accounts: through the Microsoft OAuth API. This continues a trend of hackers exploiting recognizable software companies in order to convince users to accept malware, including another Microsoft vulnerability that compromised account tokens.