Author Archives: mike

Apache: Disabling TRACK and TRACE Methods

By default Apache supports a number of HTTP methods in addition to the ones we normally use – GET (to get objects) and PUSH (to push form data although you can send form data with GET too). These additional methods … Continue reading

Posted in Technical | Tagged , | Comments Off on Apache: Disabling TRACK and TRACE Methods

Apache: Blocking “Dangerous” Files

There are all sorts of “dangerous” files that can appear within a web server’s document root; some are merely potentially dangerous but some can be genuinely dangerous. For example, if someone uses an editor to change a .php file, it is … Continue reading

Posted in Technical | Tagged , | Comments Off on Apache: Blocking “Dangerous” Files

Processor Bugs: Meltdown and Spectre

There has been lots of stories relating to two new severe security vulnerabilities (one of which is in every Intel processor for over a decade); the trail of stories starts here. The details of the vulnerability are very highly technical … Continue reading

Posted in Technical | Tagged , | Comments Off on Processor Bugs: Meltdown and Spectre

The New Mirai

According to one news report, a new version of Mirai has recently been released causing an increase in the number of scans against port 2323 and port 23. According to our firewall logs, the number of scans against tcp/2323 has … Continue reading

Posted in Active Attacks, Technical | Tagged , | Comments Off on The New Mirai

Serious OSX Vulnerability – Get Root Without A Password

Apple’s latest version of their OSX (or macOS) operating system – High Sierra – has been found to have a serious vulnerability that allows anyone with access to the device to have full administrative access (“root”) without a password. On … Continue reading

Posted in Active Attacks, Passwords | Tagged , , , , | Comments Off on Serious OSX Vulnerability – Get Root Without A Password

BadRabbit Up And Running

According to reports, a new ransomware infection dubbed “BadRabbit” is spreading in Russia and Ukraine, and one or two other places further afield. Early indications are that this is not going to become a really nasty problem, but that could be wrong. … Continue reading

Posted in Active Attacks, Malware | Tagged , | Comments Off on BadRabbit Up And Running

KRACKing Wireless

The latest big security exploit is a mechanism by which WPA2 secured wireless networks can be compromised to disclose previously encrypted traffic in the clear, and to insert malicious traffic. The original web site announcing the vulnerability can be found … Continue reading

Posted in Technical | Tagged , , , | Comments Off on KRACKing Wireless

Patching Your Mouse? Yes, Really!

Strange as it may seem, if you have a certain type of wireless mouse you may be vulnerable to an attacker being able to inject keyboard keystrokes into your computer; with this they are able to do just about anything … Continue reading

Posted in Technical | Tagged | Comments Off on Patching Your Mouse? Yes, Really!

Think Work, Think VPN

We are encouraging everyone who works remotely to immediately start up a VPN connection (to our VPN of course!) whenever they start working remotely. This is for a variety of reasons, but includes :- Any on site services that you might … Continue reading

Posted in General | Tagged , | Comments Off on Think Work, Think VPN

Updating Windows Servers

You might think it is easy to update Windows servers, but apparently that is not always the case. It is easy to simply “check for updates” when you first install a server, and then forget about it. Which is the wrong … Continue reading

Posted in Technical | Tagged , , | Comments Off on Updating Windows Servers