Certificates – How to convert PFX to PEM

In order to do this you must have OpenSSL installed on your Windows or Linux system. This software is free

Read more

Trend Micro Security 2019 (Consumer) Tampering Vulnerability [CVE-2019-19697]

CVE number – CVE-2019-19697 Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of

Read more

Satan ransomware rebrands as 5ss5c

5ss5c is newly observed ransomware that has been attributed to the same threat actor that developed Satan. 5ss5c is distributed by a spreader

Read more

Microsoft January 2020 Security Updates

The January security release consists of security updates for the following software: Microsoft Windows Internet Explorer Microsoft Office and Microsoft

Read more

PowerShell Code – Hostname to IP Address

Here is some PowerShell code that will convert hostnames to IP addresses. It will read from a text file and

Read more

MH370/MAS370 Email Scam

As with many things in life, scammers will stoop to any low level to get money from you, here is

Read more

CES 2020 Comes To An End – AI and 5G Are Future of Innovation

CES2020 finished yesterday, following a week filled with over 20,000 product debuts unveiling the future of technology. More than 4,400

Read more

Facebook and eBay pledge to combat trading in fake reviews

Following action from the CMA, Facebook and eBay have committed to combatting the trade of fake and misleading reviews on

Read more

67 tech firms represent UK at Consumer Electronics Show in Las Vegas

UK technology firms to showcase British innovation at the Consumer Electronics Show in Las Vegas, including 12 start-ups from the

Read more

Multiple vendors Ping Flood denial of service [CVE-2019-9512]

CVE number – CVE-2019-9512 Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The

Read more
%d bloggers like this: