-
Recent Posts
Recent Comments
Archives
- March 2024
- February 2024
- October 2023
- September 2023
- May 2023
- January 2023
- September 2022
- August 2022
- March 2022
- February 2022
- January 2022
- November 2021
- September 2021
- May 2021
- February 2021
- December 2020
- October 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- October 2019
- September 2019
- July 2019
- June 2019
- May 2019
- April 2019
- February 2019
- January 2019
- November 2018
- October 2018
- May 2018
- March 2018
- January 2018
- November 2017
- October 2017
- August 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- March 2016
- February 2016
- January 2016
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- February 2015
- January 2015
- September 2014
- August 2014
- July 2014
- June 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- August 2012
- July 2012
- June 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
Categories
Meta
Author Archives: mike
Heartbleed SSL Vulnerability
Given the serious nature of this vulnerability, it is worth taking the unusual step of explaining what it is and what makes it so serious. The vulnerability can be found within certain versions of a software component called OpenSSL. This … Continue reading
Comments Off on Heartbleed SSL Vulnerability
NTP Configuration After The NTP DDoS
As you may be aware, the University has been subjected to an NTP DDoS attack which caused multiple short intervals when the Internet was unavailable. Given the intensity of the attack, JANET (our “ISP”) have implemented a firewall rule that … Continue reading
Comments Off on NTP Configuration After The NTP DDoS
How Often Do We Get Scanned?
One of the questions that arises from time to time is just how often do we get scanned by some kind of attacker looking for vulnerabilities? This is a bit of a tough question to answer as it involves looking … Continue reading
Comments Off on How Often Do We Get Scanned?
NTP and DNS Amplification Distributed Denial of Service Attacks
This post is a bit more technical than the usual, and covers a kind of attack that is not only the kind of attack we may fall victim to, but an attack that we could participate in! Defences against this … Continue reading
Comments Off on NTP and DNS Amplification Distributed Denial of Service Attacks
Who’s Looking At You?
Many laptops these days come equipped with web cams – just look closely at the top of the screen and see if you can see a small hole there – and there has always been concern about malware that might … Continue reading
Comments Off on Who’s Looking At You?
Has Your Web Account Been Compromised?
Nearly all of us use accounts on numerous web sites. Hopefully we are all paying attention to best practices as far as security goes and have a different password on each site – no I don’t always do that either! … Continue reading
Comments Off on Has Your Web Account Been Compromised?
The Even Nastier Malware – Ransomware and Cryptolocker
In recent years there has been a new trend amongst malware authors – the introduction of so-called “ransomware” where a criminal demands money to unlock your PC. As this trend is continuing, and as we have seen an instance or … Continue reading
Comments Off on The Even Nastier Malware – Ransomware and Cryptolocker
How Safe Is Your Life (or Smartphone) ?
Sophos have published a list of key things to do with your smartphone to keep it secure :- http://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/ And now is a good time to review that list. Most of us spend more and more time with our smartphones, … Continue reading
Comments Off on How Safe Is Your Life (or Smartphone) ?
Passwords: A Little Knowledge Is A Dangerous Thing
According to this article on password security, cracking passwords is difficult enough that a 9 character password is safe. However he is working on a specific password challenge – to find a password to an encrypted archive file. And he is … Continue reading
Posted in Passwords
Comments Off on Passwords: A Little Knowledge Is A Dangerous Thing
Information Commissioner Incidents
The Information Commissioner has released some statistics on the number of reported incidents. The interesting thing about the statistics are :- The overwhelming majority of incidents are caused by human error of one form or another. It might seem that … Continue reading
Comments Off on Information Commissioner Incidents