News

Smarttech247 Winner Profile – MSSP of the Year

The Smarttech247 team were delighted to win this year’s Managed Security Service Provider title at the Tech Excellence Awards. Here is is an excerpt from our winner’s profile feature in the Tech Pro magazine this month: Tell us about Smarttech247  “Smarttech247 is a cyber security organisation that provides innovative solutions to global companies. The 3 […]

Find out more

Smarttech247 Winner Profile – MSSP of the Year

The Smarttech247 team were delighted to win this year’s Managed Security Service Provider title at the Tech Excellence Awards. Here is is an excerpt from our winner’s profile feature in the Tech Pro magazine this month: Tell us about Smarttech247  “Smarttech247 is a cyber security organisation that provides innovative solutions to global companies. The 3 […]

Find out more

Load More

Five Ways Hackers Are Stealing Passwords

Passwords

Someone once said passwords are like apples in a fictional garden. They are perfect, ripe and there for the taking! Twitter today announced that they had discovered a glitch in their systems that stored passwords in plain text (rather than being hashed), however, that no misuse or breach has been detected. But what would have […]

Find out more

Computer Vulnerabilities: How Safe Are Your Systems?

The first quarter of 2018 has recently just ended with a high number of critical vulnerabilities being discovered so far, from the early vibes of Spectre and Meltdown to Intel’s kernel leaking vulnerability up to the very recent Cisco smart install vulnerability.  Towards the end of last year, we discussed a few major attacks that […]

Find out more

The Anatomy of a Compromised Network (Part 2)

  In our last article, we began to examine the anatomy of a compromised network. We discussed what constitutes a compromised network and common ways by which network architectures get compromised. In this piece, we will be focusing mainly on how to identify a possible network compromise and discussing a few mitigation steps. Just like […]

Find out more

The Anatomy of a Compromised Network (Part 1)

A couple of years ago I had set up a honeypot to study the behaviour of botnets on smart systems. I was interested in how they become compromised and the speed at which different classes of remote commands are executed. One of the most interesting things that were observed was the seemingly normal behaviour several […]

Find out more

GDPR: EU regulators confirm the need for incident detection capability

The Article 29 Working Party has recently published updated guidance on the Personal Data Breach notification rules in Articles 33 and 34 of the General Data Protection Regulation (GDPR). The most important part of the update concerns the requirement for organisations to put in place incident detection technologies, which can ‘immediately’ detect whether a security incident has occurred. This obligation […]

Find out more

PoS Malware: How does it affect you?

2018 was welcomed in with quite a power variant of the point of sale (PoS) malware.  In January, security researchers discovered the UDPoS which disguises itself as an update for LogMeIn remote access software. As soon as a PoS terminal is infected with this particular malware, the malware creates a new system service to maintain […]

Find out more

Six Steps to an Effective Security Response Strategy

Cyber Security Incident Response Smarttech247

  “File A  now reads as xysjdsndhd.exe!  File B converting to hsdssdjsdjs.pdf Mary cannot get any file to open on her system! Is she the only one? John’s PC in accounting is experiencing the same issues! Lucy in HR also!!  Oh great! We have just been hit with Ransomware!” Cyber incidents have been on an […]

Find out more

Connected Future: Security Threats of Popular Technologies

The last seven years have witnessed an exponential growth in the development of computer technologies and the ease of life that comes as a result of them. About thirty years ago, the idea of having a fridge that orders groceries by itself once they run out or having a car that optimises its own operation […]

Find out more

Central Processor Unit (CPU) Architectural Design Flaws

Overview Google announced three major vulnerabilities that can be exploited in today’s central processing units (CPUs). Major processor vendors, operating system vendors, and application vendors were pre-notified so that they would be able to address this critical issue. Most modern CPU’s are affected. Description This collection is based on a number of articles, including those […]

Find out more