All posts tagged IT Security

eDellRoot – the Security Hole within some Dell Machines

It was only a few months ago when Lenovo were accused of installing hidden adware in their computers, but now Dell have also been accused of a similar matter with a plugin dubbed eDellRoot. Like Lenovo’s Superfish adware, it has been discovered that Dell have been sending out PC’s and laptops with a hidden security hole called eDellRoot. This means specific affected computers are being shipped from manufacture with a pre-installed trusted root certificate (called eDellRoot) that can intercept HTTPS encrypted traffic for any website the user visits. Dell have swiftly come forward announcing that eDellRoot is an unintentional security…

Top

Acunetix Web Application Vulnerability Report 2015

Acunetix have released their 2015 Web Application Vulnerability report which has aggregated the findings of over 15,000 scans performed from around 1.9 million files between a 12 month period between 2014 – 2015. Their report details an increase in web application vulnerabilities “posing serious threats to organizations’ overall security posture, such as data loss or alteration, system down-time, loss of reputation and severe fines from the regulators”. Data was taken from a random sample of 5,500 users of ‘Acunetix Online Vulnerability Scanner’ who have successfully scanned at least one scan target, out of a possible 18,000 subscribers. Signal Networks and…

Top

Acunetix and Fortinet Partner up to Provide Instant Vulnerability Detection

Acunetix have recently announced a partnership with Fortinet to provide instant vulnerability detection using Acunetix Web Vulnerability Scanner (WVS) and Fortinet’s FortiWeb web application Firewall (WAF). This partnership means that any scan results will be imported into the new FortiWeb 4000E and 3000E Web Application Firewalls where it will construct settings to diminish the detected vulnerabilities. Acunetix is a web vulnerability scanner that’s designed to replicate a hacker’s methods used to expose dangerous weaknesses on an organisations network or website. It features automated and manual penetration testing tools allowing an IT security analysts to perform vulnerability detection assessments, and repair detected…

Top

ESET Smart Security Version 9

ESET have recently released version 9 of their ESET Smart Security software making it even safer for a user to go online. Users of ESET Smart Security (the internet security software) can enjoy enhanced benefits including safer banking and online payments with additional botnet protection. Features include: New Banking and Payment Protection A special secured browser through which you can safely pay online Automatically protects you on Internet banking sites Encrypts the communication between the keyboard and the browser for safer transactions Protects you from key-loggers Enhanced Botnet Protection Added layer of security that protects against botnet malware – preventing your…

Top

Spoofed Emails

In the last few months, the team at Signal Networks have seen a dramatic rise in the number and sophistication of spoofed emails being sent. It’s vital that organisations stay aware of spoofed emails and have the correct procedures in place should one get past your security procedures due to human error. Spoofed emails are malicious emails sent by spammers but with a disguise on them. This disguise is a masquerade to trick users into believing it’s been sent from a reputable source when in fact, it’s an unknown and harmful source. Usually spoofed emails are sent from email addresses…

Top

How to Control your Privacy in Windows 10

It’s been three weeks since users gained access to Windows 10, however there has already been a steady increase in the number of complaints about privacy in Windows 10. The new platform has been designed to give the user a more secure and robust experience but this comes with some concerns. With this in mind, we’ve noted down seven simple actions that can be used to combat some of the many privacy concerns users have complained about: Think Twice About Cortana- Cortana operates using machine-learning techniques that pick up on how you work and adapts to your needs. In order to do…

Top

It’s Not Always About Flashy Security Widgets

At Signal Networks, we believe basic security ‘hygiene’ is a must for any organisation whatever their size, location or budget. Ensuring your business is up-to-date and actively protecting itself from any hackers or opportunists needs to be a standard practice that is constantly maintained. In the same way you’d brush your teeth for a few minutes every day, you need to be protecting your IT network from security threats for a few minutes every day. These steps do not need to take up all of your time, and in some instances, once you’ve put the groundwork in place, they can…

Top

Important: Update Adobe Flash Now

UPDATE- After this article was published, Flash re-released another updated version 18.0.0.209 . This can be found by clicking here.   Users have been advised to update Adobe Flash as soon as possible following the discovery of a Neutrino exploit kit that is using a Flash Zero-day exploit. This exploit was revealed during the recent hacking of a company called ‘Hacking Team’ who “sells malware and spyware technology to governments and law enforcement and intelligence agencies”. Hacking Team were hit by an unknown user/s on 6/7/15 who took control of their Twitter page and posted links to a torrent file containing over 400GB…

Top

Cyber Security Monitoring and Logging Guide reported by Crest

A report called ‘Cyber Security Monitoring Guide’ has been released by Crest detailing how organisations need to focus their resources and attention deeper on security monitoring and logging issues to help detect potential Cyber-Security attempts. Crest, a “not for profit organisation that serves the needs of a technical information security marketplace” detailed their findings in the form of a guide. The aim of this guide is to provide practical advice how organisations can “manage logs effectively, deal with suspicious events, use cyber security intelligence and address challenges” providing focus on the following points: Identify potential indicators of compromise (IOC) at an early…

Top

5 Sentences Your In-house IT Department Should Never Say

If you are a small business chances are you have been battling on your own with the challenges that computers have thrown at you. As a mid-sized company, you may be experiencing the growing pains that come with additional equipment and licenses. There are many challenges for SME’s, but having your own in-house IT department is rarely cost effective. Here at Signal Networks, we use our collective knowledge and work as a team to ensure your IT requirements are in safe hands. With many years of experience in all areas of information technology, inclusive of servers, networking, storage management, architecture…

Top
1 2 3 6 Page 1 of 6

Call us 0333 370 2202

Or email us: [email protected]