• HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE

Knowledge Update: 29 September 2017

29-September-2017
-
Blog
-
No comments
-
Posted by Tom Lejava

This week’s Knowledge Update talks about how one fifth of IoT device owners are unaware of Mirai, an easy to exploit flaw in Linux kernel that is rated ‘high risk’ and how phishers use private banking messages to lure victims.

 

One-Fifth of IoT Device Owners Unaware of Mirai

 

The proliferation of the Internet of Things has left many vulnerable to attack, as users do not appreciate the security implications of their new products. A Trustlook study revealed that more than one-third (35%) of IoT device owners do not change the default password on their devices, leaving them vulnerable to attacks. Also, 54% of do not use a third-party security tool to protect their devices from outside threats.

It is recommended that all default passwords should be changed and that updates should be applied regularly to devices. Information on what makes a strong password can be found here.

Read more.

 

Easy-to-exploit flaw in Linux kernel rated ‘high risk’

 

A flaw has been found in the way the Linux kernel loads ELF files. As the article describes: “The flaw represents a possible mechanism for a hacker or other malicious party to step up from a normal user to root – e.g. you get a shell as an ordinary user via a compromised web application or another internet-facing service, and then use the above bug to take full control of the box. It can also be abused by logged-in users to gain administrative access over the machine.” Updates should be run on affected systems to ensure that the vulnerability is patched.

More information on Flaws and the risks they pose can be found here.

Read more.

 

Phishers Use Private Banking Messages to Lure Victims

 

Security experts are warning of a new phishing campaign designed to trick private banking clients into downloading
covert malware onto their machines. The spoof emails employ classic phishing techniques to socially engineer their targets, including the use of legitimate-looking banking domains and secure messages of the sort often received by private banking customers. As the article notes: “Phishing remains the most commonly exploited attack vector, according to a new study out this week. Staff are most often victims of spoofing and impersonation (67%), followed by branded (35%) and seasonal (31%) attacks, according to IronScales.”

Staff training and awareness remains as important to prevent phishing attacks as technical controls, more
information on how a business can protect itself from phishing attacks can be found here with the small
business guide infographic.

Read more.

Tags
Knowledge Update
Phishing
← PREVIOUS POST
News Roundup September 2017
NEXT POST →
What Is Penetration Testing? – Part One: The Perimeter
Categories
  • Blog
  • Press Release
Recent Posts
  • Is your business cyber-ready?
  • You’ve Got Mail: 5 Tips to Secure Your Email
  • #OneReset - What could you really lose in a hack?
  • Here’s what GDPR means for your business!
  • Essential Advice for Small Business Cyber Security
London Digital Security Centre

We are a Not for Profit organisation, launched by the Mayor of London as a joint venture with the Metropolitan Police and City of London Police.

Leave a Comment

Your feedback is valuable for us. Your email will not be published.
Cancel Reply

Please wait...
Submit Comment

Related News

Other posts that you should not miss.

Leicester Conference Cyber Resilience Week 2017

13-September-2017
-
Blog

What a start to the Digital Leaders Cyber Resilience week! Working with the East Midlands Chamber of Commerce and supported by De Montfort University, NatWest Bank and Identifi …

Read More →
Posted by Tom Lejava
1 MIN READ
LDSC knowledge update

Knowledge Update: 26 January 2018

26-January-2018
-
Blog

This week’s Knowledge Update talks about how half of Norway’s population may have been breached, the head of NCSC stating that a major cyber attack in the UK …

Read More →
Posted by Tom Lejava
3 MIN READ
LDSC knowledge update

Knowledge Update: 28 July 2017

28-July-2017
-
Blog

This week’s Knowledge Update talks about a bug in smartphones that could lead to unstoppable malware that could be easily spread, the ‘Destruction of Service’ attacks that have …

Read More →
Posted by Tom Lejava
3 MIN READ
Twitter Follow
Tweets by LondonDSC
Social Connect
News
  • 18-March-2019
    Is your business cyber-ready?
  • 05-February-2019
    You’ve Got Mail: 5 Tips to Secure Your Email
  • OneReset
    23-October-2018
    #OneReset - What could you really lose in a hack?
Contact Us

Company Number : 09639299
Mail to : [email protected]
Address : One Wood Street, London,
United Kingdom, EC2V 7WS.

Built by Cyber Rescue
Privacy   T & C
Copyright London Digital Security Centre (LDSC) 2017
Knowledge Update: 29 September 2017 - London Digital Security Centre
 Logo Header Menu
MENU
  • HOME
  • MEMBERSHIP
  • IN THE COMMUNITY
  • MARKETPLACE
    • SECURITY PRODUCTS
  • ABOUT US
    • PARTNERSHIPS
    • OUR TEAM
  • NEWS & EVENTS
    • EVENTS
    • PRESS RELEASES
    • BLOG
    • MEDIA OVERVIEW
    • GALLERY
  • TIPS & ADVICE