Blog

 
May 20, 2019

Lenovo is trying to become the world’s largest hyperscale infrastructure provider

Lenovo is trying to become the world’s largest hyperscale infrastructure provider even though their data center is still relatively new. For the first 5 years Lenovo […]
May 14, 2019

Over 13,000 iSCSI storage clusters are currently accessible through the internet after their respective owners forgot to enable authentication.

Over 13,000 iSCSI storage clusters are currently accessible through the internet after their respective owners forgot to enable authentication. The new attack vector opens the backdoor […]
May 5, 2019

Have we seen the end of fax machines in Australian healthcare?

The Australian digital healthcare agency (ADHA) is willing to pay big money for a secure messaging service so they can end the use of fax machines. […]
May 5, 2019

How to spot a drowning swimmer.

Summer time is almost here! It’s starting to get hot out, so let’s shed some layers, grab your floaties and find a pool to chill out […]
April 25, 2019

Think your data and personal information is safe on your universities network? Think again.

It only took hackers two hours to break into the university networks through phishing emails to gain administrator access and see your personal data, financial information […]
April 25, 2019

A Google engineer reported a flaw in the TP-Link smart home routers and they failed to respond.

The Google security engineer, Matthew Garrett, privately disclosed this zero-day vulnerability impacting the TP-Link SR20 smart home routers. The company failed to fix the issue within […]
April 22, 2019

Microsoft paid out over $2m in 2018 to their bug bounty program and looking to increase that number this year.

The Microsoft Bounty Program is being overhauled now that they’ve seen the growth in the program, awarding researchers over $2m in 2018 alone. HackerOne will be […]
April 19, 2019

FIN6 Cybercrime group is moving on from malware and upgrading to ransomware.

FIN6 is primarily known for hacking retailers and stealing payment card details from (POS) point-of-sale systems has changed their targets and now planning to deploy ransomware […]
April 16, 2019

The Heath Robinson codebreaking machine from WW2 has been reconstructed after a seven year project.

A team of six working together has completely restored the Heath Robinson at the National Museum of Computing. This machine was initially built to try and […]