Contrary to popular belief – the internet is not magic. It’s okay to think of it as a series of black boxes – with a given input and a given output – but there are services and connections that layer up into what you see as the end user. For want of a better word… Keep Reading
Spam gets through. It is a fact of life. We are no exception. If anything we are more of a target than yourselves, as be it Salesmen, Accountants, Network or Systems Engineers – they are likely to have access to some resources that would be both ‘interesting’ and ‘fun’ to your average, and your not-so-average… Keep Reading
IoT or Internet of Things – it really is becoming “a thing”. However – like so many fledgeling technologies – its ability to deliver is outstripping its maturity as a space we live, work, compete, stick-a-flag-in-and-call-home. With the recent example of the Dyn Attack invoking some of the largest Denial of Service attacks in history…. Keep Reading
Following up on my earlier article about deployment of LET’S ENCRYPT within Linux Plesk and cPanel, and with an angle towards Encryption Everywhere or at the very least by default… did you know there were free S/MIME certificates out there for non business use? Well there are! Major brands (such as COMODO) provide these to… Keep Reading
For non for profits that are using either Linux Virtual Machine / Virtual Private Servers, or Dedicated Servers with Hosting UK you may be interested in this release that came out from Cloud Linux in the last few days. “In light of the recent Dirty Cow exploit, said by experts to be the “Most serious”… Keep Reading
For those users using cPanel on their VPS or dedicated servers – there has been an advisory released regarding EasyApache3 and PHP – specifically the GD module. If you are using EasyApache4 then the RPM’s will have happily downloaded and upgraded without your intervention (unless you have set it to otherwise). This is a live… Keep Reading
I was sent this article over today by a colleague – and thought it was well worth sharing here. So – you use two factor authentication, you use long passwords, high entropy you … well you know what think again – social engineering is very much alive and well – someone to let them in… Keep Reading
If there are two things that are going to make life a process of jumping through hoops it is incorrect contact details on an account, or incorrect contact details on a domain name. We all change our email addresses from time to time – especially ones that are out of band and are, to a… Keep Reading
Today a short piece on the importance of patching – mainly as we are seeing an increase in compromise activity. From this side of the fence it is a very different view from yours on the whole. You have one website maybe five, we have thousands. Statistically speaking – compromise – its not if but… Keep Reading
The mythical Wall of Fire : “How could this have happened, I am behind a firewall?” A firewall is often assumed to be some kind of magic bullet. This short article covers the essence of what a firewall is – and more importantly what it is not. The word Firewall is borrowed from another application…. Keep Reading
You must be logged in to post a comment.