Blog

UK Information Commissioner Christopher Graham has warned that “there are people out there who are snooping” and specifically cited a website showing thousands of live feeds (images) to baby monitors, stand-alone webcams and CCTV systems. Speaking about the website he told the BBC: “It’s got more than 500 UK webcams where there is a facility for remote access to check what’s […]


Mobile security researchers, FireEye have discovered another weakness in Apple’s iOS (versions 7.1.1, 7.1.2, 8.0, 8.1 and 8.1.1 beta) which could be exploited by cyber criminals.  All the criminals need do is trick you into installing a third party app which could replace (or mask) one of your genuine app’s installed through the App Store (e.g. email or mobile banking), as long […]


Do you browse the Web, write documents or check emails using an account with Administration privileges/rights?  If so, you’re putting yourself and the data you store at greater risk. Why? Recently a security researcher has discovered a flaw (named ‘Rootpipe’) in some versions of Apple’s OS X operating system (including the newly-released 10.10 Yosemite), which is believed to have […]


                Recently we’ve become aware that a POODLE has been attacking web browsers (e.g. FireFox, Internet Explorer, Google Chrome, Safari). Is your computer, tablet or smartphone POODLE proof? Take the test now!    Test 1   &   Test 2  Do you need to make changes to your browser settings? Get help with this here . […]


In this weeks The Mac Security Blog we are advised of a recent kerfuffle about concerns that the latest version of Apple’s OS X Yosemite operating system, was sending precise details of users’ locations and their search terms back to Apple. This will also affect users of iOS 8, searching with Spotlight. Although OS X Yosemite patches numerous security […]


On Tuesday Microsoft warned Windows users of a new zero-day flaw currently being exploited by Cyber criminals via PowerPoint, affecting all releases (except Windows Server 2003). Yesterday Graham Cluley advised users to be on guard and refer to the following security advisory, where Microsoft outlined the bug and provided a one-click tool from its “Fixit” line that customers can […]



What is Shellshock? It is a vulnerability or bug in a piece of software called Bash (Bourne Again Shell) which has been discovered this week. The bug has the potential to affect millions of computers and has been nicknamed Shellshock. How serious is it? The United States National Vulnerability Database have rated the bug as […]



What A flaw in eBays security settings has allowed criminals to use Cross Site Scripting (XSS) to list items on the popular auction site which redirect users to phishing pages designed to steal usernames and passwords or potentially deliver viruses and malware to users computers. The issue was originally identified in February, but hit the […]