Year: 2018

NewsSecurity News

Underminer Exploit Kit

The Underminer Exploit Kit was first observed in July 2017, the exploit kit (known as ‘Hidden Bee’) has received various sophisticated

Read More
NewsSecurity News

Sieren Botnet

Sieren is a botnet that can perform distributed denial-of-service (DDoS) attacks by sending floods of HTTP, HTTPS and UDP packets to specified web servers.

Read More
HealthNews

Shake-up Of GP IT Will Remove Outdated Systems

Outdated and frustrating IT systems in GP practices will be replaced with modern technology under widespread changes announced by the

Read More
NewsSecurity Vulnerabilities

D-Link DCM-604 and DCM-704 Vulnerability [ CVE-2018-20445]

CVE Number – CVE-2018-20445 A vulnerability, which was classified as problematic, has been found in D-Link DCM-604 and DCM-704 (unknown

Read More
NewsSecurity Vulnerabilities

Technicolor TC7110.AR SNMP Vulnerability [CVE-2018-20438]

CVE Number – CVE-2018-20438 A vulnerability has been found in Technicolor TC7110.AR STD3.38.03 and classified as problematic. This vulnerability affects

Read More
NewsSecurity News

NCSC launches website vulnerability reporting service

The National Cyber Security Council (NCSC) has launched a vulnerability reporting service for government websites. It provides a route for

Read More
NewsSecurity News

Confidential Data Loss In Gladsaxe Denmark

Confidential data of 20,000 residents in Gladsaxe, Denmark has been lost following the theft of a computer from the town’s city hall between

Read More
NewsTV

Most Complained About UK TV Programmes Of 2018

During 2018, Ofcom received almost 56,000 complaints about programmes from viewers and listeners. The figures reveal that the ‘top 10’

Read More
NewsSecurity News

Steelite International (Stoke-on-Trent) Hit By Cyber Attack

Steelite International which is based in Stoke-on-Trent, discovered hackers had encrypted its servers. During the attack, a hacker from a

Read More
NewsSecurity Vulnerabilities

Linux Kernel USB Subsystem Data Size Checks Handling Vulnerability [CVE-2018-20169]

A vulnerability in the USB subsystem of the Linux Kernel could allow a local attacker to execute arbitrary code or

Read More