What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]
The Shellshock Q&A
What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]
Has the 5 million Gmail password hack affected you?
On Wednesday, many technology websites and blogs broke the news that hackers leaked around 5 million stolen Gmail account details to a Russian Bitcoin forum. This follows similar leaks of account data from popular Russian web services, so is there room to be concerned? Understandably, this has caused huge outrage and worry amongst users of […]
Why does my company need self-service password reset?
Wikipedia has defined self-service password reset as “any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk”. Simply put, self-service password reset allows you to manage your password through answering pre-set […]
The Impact of BYOD on Data Security in Schools
Schools are now more than ever before in possession of a huge amount of personal and sensitive data about both staff and students. This can include data such as exam results or private medical information. Therefore, the importance of securing this data within school IT systems goes without saying; it becomes increasingly critical because many […]