3aIT Blog

Cloud-based file storage services such as iCloud, Dropbox and Google Drive offer a very easy way to make your important files available to you from wherever you wish to access them. Whether you’re using a desktop machine in your office, a phone at home, or a laptop on the other side of the world, your files are always available to you.

A lot of people wouldn’t be able to tell you what internet browser they use despite the fact that they spend huge amounts of each day using it. Some may not even be aware what exactly a browser is (it’s the thing you click on to get onto the internet). Historically, there were big differences between the various web browsers, and distinct reasons to pick one over the other.

Microsoft have just revealed their new operating system - Windows 10. No, we don't know what happened to Windows 9 either! Nonetheless, the main aim of this new operating system will be to create a single interface that will work across many devices - desktop machines, tablets, mobiles, and even Xbox consoles. There will be a single app store that will service all of these machines.

Last week, a vulnerability (codenamed "Shellshock") was found in a tool called "Bash". This programme is installed by default on millions of machines, especially servers. Bash is a command line interface that is frequently used as the primary point of access to do carry out whatever tasks need performing on these machines.

According to emerging reports, there has been a major flaw found in the web browser that comes as standard in millions of Android devices. If exploited, this vulnerability would allow an attacker to view other websites that the browser may also currently be accessing.

We have seen an uptick of email from unknown sources with PDF attachments of late. It is worth restating that you should be very wary of ANY email from an unknown source regardless of the content. Attempts to compromise machines via email come in many forms. Most frequently, this will either be via a zip attachment, or a link to a malicious website. However, the people engineering these emails know that awareness of attacks in this form is increasing, so are always on the lookout for new ways to trick people into compromising their machines. This recent spate of emails fall into that category.

Page 34 of 37