Search for anything.

Your search for: "" revealed the following:

Search...

Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Consider IT
0131 510 0110Contact Us For A Free Quote
[email protected]Consider IT Limited, Waterview House, Edinburgh, EH6 6QU
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us
Consider IT
Consider IT
  • Home
  • About Us
        • About Us

          • Our Locations
          • Our Clients
          • Awards / Accreditations
          • Work For Us – Careers
          • Meet The Team
          • Environmental and Social Responsibility
  • Our IT Approach
        • Our IT Approach

          • IT Support For Start-Ups
          • Working With Your IT Teams
          • Replacing Your Existing IT Team
  • Our IT Services
        • IT Support

          • Managed IT Services
          • Co-managed IT Support
          • IT Strategy
          • IT Consultancy
          • ICT Project Delivery
          • IT & Communication Procurement
          • Business Continuity
        • COMMUNICATIONS

          • Connectivity And Internet
          • Microsoft Teams Talk
          • Phone Systems
          • Phone Services
          • Audio & Video
          • Business Mobiles
        • CYBER SECURITY

          • Cyber Essentials
          • Vulnerability Testing
          • Penetration Testing
          • Incident Response
          • Compliance
          • Free Risk Assessment
        • Cloud Technology

          • Critical Web Hosting
          • Colocation
          • Microsoft Partner
  • Microsoft Services
        • Microsoft Services

          • Microsoft Licensing
          • Endpoint Management
          • Endpoint Security
          • Cloud Identity Management
          • Email Security
  • Resources
        • Resources

          • Client Case Studies
          • Blog & News
          • E-Books
  • Quick Quote
  • Contact Us

Your search for: "" revealed the following:

Search...

Posted by stuart.gilbertson

HomeArticles Posted by stuart.gilbertsonPage 4
Recent Posts
  • Cyber Risks for Charities: How to Safeguard Your Organisation
    Oct 24 2024
  • Upcoming Cyber Essentials Changes in April 2025
    Sep 27 2024
  • Consider IT is now a certified B Corp Text on Blue and Orange background
    Celebrating a New Milestone: Consider IT Becomes a Certified B-Corp
    Jun 04 2024
  • Consider IT blog title: Over 19000 sensitive documents stolen in Volkswagen breach overlayed on orange and blue gradient background
    Volkswagen Group has over 19,000 sensitive documents stolen in Cyber Attack
    Apr 24 2024
  • Blog Title 7 strategies to combat malware and ransomware on a blue and orange gradient background
    Staying Ahead of the Game: 7 Strategies to Combat Malware and Ransomware
    Apr 19 2024
  • Blog title The cost of a cyber attack on a blue and orange gradient background
    Counting the Costs: Understanding the Financial Impact of Cyber Attacks on Businesses
    Mar 19 2024
  • Blog title The Importance of Cyber Security Awareness training on a blue and orange gradient background
    The Importance of Cyber Security Awareness Training
    Feb 28 2024
  • Blog title Why choosing and independent IT support provider trumps big corporations on a blue and orange gradient background
    The Personal Touch: Why Choosing a Local, Independently Owned IT Support Provider Trumps Big Corporations
    Jan 10 2024

How to hack any Linux machine using Grub2

Pressing the backspace key 28 times will let you circumvent a locked-down Linux machine researchers at Universitat Politechnica de Valencia recently discovered.

The GRUB bootloader used by most Linux distributions has the option to password protect boot entries. Not only will this prevent tampering but allows you to prevent peripherals such as CDs and USB ports from booting an OS. Without this protection an attacker could boot a system from a live USB key or CD, switching into their preferred operating system to download or access files stored on the machine’s hard drive.

This flaw with Grub2, of which versions 1.98 and 2.02 are affected, means a simple tap of the backspace key 28 times will bring up the prompt usually hidden behind the password screen.

In a security advisory, Marco and Ripoli said the bootloader is used by most Linux distributions, resulting in an “incalculable number of affected devices.” (available here)

An attacker which successfully exploits this vulnerability will obtain a Grub rescue shell. Grub rescue is a very powerful shell allowing to:

  • Elevation of privilege: The attacker is authenticated without knowing a valid username nor the password. The attacker has full access to the grub’s console (grub rescue).
  • Information disclosure: The attacker can load a customized kernel and initramfs (for example from a USB) and then from a more comfortable environment, copy the full disk or install a rootkit.
  • Denial of service: The attacker is able to destroy any data including the grub itself. Even in the case that the disk is ciphered the attacker can overwrite it, causing a DoS.

To quickly check if your system is vulnerable, when the Grub ask you the username, press the Backspace 28 times. If your machine reboots or you get a rescue shell then your Grub is affected.

 

 

stuart.gilbertson
December 21, 2015
0
Share:

TalkTalk hacked – significant data breach

TalkTalk have once again shown their inability to keep customer data safe. Police are now investigating what TalkTalk term a “significant and sustained cyber-attack” on their website.

talktalk-hack-oct2015

Their website currently shows the page above highlighting the fact the website is unavailable right now.

An official statement was released by TalkTalk on 22/10/2015: View Statement in Full.

What the statement doesn’t highlight is what customers of TalkTalk need to do now.

The investigation is ongoing, but unfortunately there is a chance that some of the following data may have been accessed:

  • Names
  • Addresss
  • Dates of birth
  • Email addresses
  • Telephone numbers
  • TalkTalk account information
  • Credit card details and/or bank details

TalkTalk have also created a help page here for those who may have been affected: http://help2.talktalk.co.uk/oct22incident

Please be aware, TalkTalk will NEVER call customers and ask you to provide bank details unless we have already had specific permission from you to do so.

Our Managing Director, Stuart Gilbertson, said: “This is the third time TalkTalk have been hacked in a year. Yes, they’re cheap, but is it really worth the hassle and inconvenience to consumers? At what point do we start heavily penalising big corporations for being inept at keeping their systems secure. Once is excusable, but three times really is pushing the boundaries of incompetence.”

 

stuart.gilbertson
October 23, 2015
0
Share:

AVG Anti-Virus – Stuck on Starting Windows

We have noticed a large number of calls yesterday and today in relation to users on Windows 7 where the computer sits stuck on a “Starting Windows” page. The common denominator between all of these incidents is that the computers had AVG Anti-Virus installed.

Whilst we wait on AVG getting back to us with news on this issue we have been resolving these incidents by booting the computers in to Safe Mode, un-installing AVG completely, then booting back into Windows in normal mode before reinstalling AVG.

windows-starting

This is not the first time Anti-Virus programs have caused catastrophic issues with Windows PCs. In April 2010 a McAfee pushed out an update that caused a false positive identification, and incorrect deletion, of the critical Windows system file svchost.exe.

Edinburgh based IT Support Technician Ryan Morrison said: “I’ve been dealing with a few cases this morning and yesterday afternoon where the computer just fails to boot. I haven’t had time to confirm this yet, but it looks to be caused by AVG preventing a Windows Update from applying and causing the boot loader to get stuck on Starting Windows.”

After the system has sat on the “Starting Windows” screen for a while the PC will then automatically go into the Windows Recovery mode.

In some instances, re-installing AVG after safely removing it causes the problem to reoccur. We await AVG’s response to our report and we will update this page as soon as we have more information.

 

Update as of 24/06: We received an update from our AVG Account Manager which says:

We have a problem the past week however we have been advised to ask all partners to uninstall Trusteer Rapport from the customers computer using safe mode as we think this may be causing the problem. If you are unable to uninstall Trusteer Rapport, you can temporarily uninstall AVG following the instructions in Uninstall AVG.

 

stuart.gilbertson
June 19, 2015
0
Share:

Windows Server 2003 end of support

On 14th July 2015 Microsoft will cease supporting Server 2003. This means that, going forward, there will be no more updates or patches for the Server Operating System, which will lead to a less stable and less secure server infrastructure for any businesses that choose to continue to use the system after this date.

Any organisation that is still currently using Microsoft Server 2003 needs to put in place a plan of action to migrate to a new server Operating System, or find an alternative IT infrastructure solution.

Edinburgh IT Support consultants, Consider IT, suggest getting in touch and we’ll provide options for moving forward to a secure and reliable solution.

 

stuart.gilbertson
June 9, 2015
0
Share:

HMRC jumps ship to Google Apps, ditches Microsoft

HMRC has turned its back on Microsoft after announcing the news that they plan to switch to Google’s cloud apps services.

First reported by The Register, 70,000 HMRC employees are dumping Microsoft’s productivity solutions in favour of the Google Apps service proudly boasted by the internet giant.

This means HMRC will be the first of the major UK governmental departments to make the switch away from Microsoft.

HMRCInterestingly, back in May 2013, MPs accused the internet giant of deliberately subverting its motto, “don’t be evil”, in order to pay less tax. It’s almost ironic that of all the government bodies to make the move to Google Apps it’s HMRC that’s doing so.

Infuriated members of the House of Commons Public Accounts Committee (PAC) lashed out at the company as one of its most senior executives insisted it was not “selling” advertising in the UK – but in low-tax Ireland instead.

 

The arrangement allowed Google to pay just £6m in UK corporation tax in 2011 despite generating more than £3bn in advertising revenues in this country.

apps_logo_3D_online_medium3

“You are a company that says you do no evil,” said Margaret Hodge, the committee’s chairman. “I think that you do do evil. You use smoke and mirrors to avoid paying tax.”

 

But, press on they will. HMRC have obviously settled their differences with Google and are willing to switch to the Google Apps productivity suite.

The Cabinet Office has 2,500 users on Gmail at the moment. The government said in March the Google Apps suit best met the user needs for the Cabinet Office and DCMS.

David Fitton, head of public sector sales for Google UK wrote on Linkedin:

“The acceptance by HMRC that they can store OFFICIAL information offshore in Google data-centres represents a major change and endorsement of Google’s approach to managing sensitive information.”

Edinburgh IT Support company, Consider IT, supports both the Google Apps cloud-service and Microsoft’s Office365.

stuart.gilbertson
June 5, 2015
0
Share:

SourceForge has begun hijacking popular software from their download lists

SourceForge is a popular website that offers source-code repository, downloads mirrors, bug tracker and other features. It acts as a centralised location for software developers to control and manage free and open-source software development. What you might know it from is its usefulness in providing downloads of popular software, rather than having to go to the developer’s website to get it.

Since yesterday at least, SourceForge has now since started to distribute adware/malware in certain projects hosted on their site.

NMAP, an open-source network tool used extensively by IT Professionals has been hijacked by SourceForge and the developers have hit back on security notice boards:

Hi Folks! You may have already read the recent news about SourceForge.net hijacking the GIMP project account to distribute adware/malware. Previously GIMP used this Sourceforge account to distribute their Windows installer, but they quit after SourceForge started tricking users with fake download buttons which lead to malware rather than GIMP. Then SourceForge took over GIMP’s account and began distributing a trojan installer which tries to trick users into installing various malware and adware before actually installing GIMP. …

Anyway, the bad news is that SourceForge has also hijacked the Nmap account from me.

Despite promises to avoid deceptive advertisements that trick site visitors into downloading unwanted software and malware onto their computers, these malicious ads are appearing on projects that have been taken over by SourceForge’s anonymous editorial staff.

FileZilla was an early participant in DevShare, SourceForge’s revenue sharing plan for open-source developers. It was supposed to be opt-in only. By allowing SourceForge to wrap downloads in a Web installer that offered up to three different software bundles, open-source projects could generate some cash to support development.

But GIMP never enrolled in DevShare—SourceForge foisted the adware on the project’s Windows installer after taking over the project’s page. On Sunday, the GIMP team issued an official statement through Michael Schumacher, a maintainer of the GIMP website. It said that the GIMP team was never informed of what SourceForge was going to do.

“This was done without our knowledge and permission, and we would never have permitted it,” Schumacher wrote. Furthermore, he noted, the move broke a promise SourceForge made in November 2013: “We want to reassure you that we will never bundle offers with any project without the developers consent.”

SourceForge’s search engine ranking for these projects often makes the site the first link provided to people seeking downloads for code on Google and Bing search results.

Some of the software hosted on SourceForge are as follows:  openoffice, audacity, fedora, firefox, gimp, gnu privacy guard, joomla, libre office, multiwii, neverball, nmap, sqlite, simulationcraft, snort, texworks, transmission, vlc media player, wordpress, recaptcha, apache, mame, mysql, thunderbird.

We suggest avoiding SourceForge for the foreseeable!

 

stuart.gilbertson
June 4, 2015
0
Share:

Paypal: “Accept our auto calls and auto texts or close your account”

PayPal and eBay have fallen out and are splitting up with each other on 1st July 2015. PayPal have published a new set of Privacy Policies that will come into force on the same day.

IF YOU DO NOT AGREE TO THE AMENDED USER AGREEMENT, PRIVACY POLICY OR ACCEPTABLE USE POLICY, YOU MAY CLOSE YOUR ACCOUNT BEFORE JULY 1, 2015 AND YOU WILL NOT BE BOUND BY THE AMENDED TERMS.

PayPal is nice enough to give its customers only two options when it comes to the new terms: begrudgingly accept them or close your account entirely.

There’s a temporary page showing all the new Privacy Policy changes in full with the highlighted points at the top. The top paragraph states several scenarios where PayPal may choose to automatically call or text you:

  1. notify you regarding your account
  2. troubleshoot problems with your account
  3. resolve a dispute
  4. collect a debt
  5. poll your opinions through surveys or questionnaires
  6. contact you with offers and promotions
  7. as otherwise necessary to service your account or enforce this User Agreement, our policies, applicable law, or any other agreement we may have with you.

Some of these items are standard and fair, but the ones highlighted in red might start putting some of PayPal’s customers off the idea of using their service completely.

What are your thoughts on this? Pop a comment below!

stuart.gilbertson
June 3, 2015
0
Share:

Half of UK homes are turning to tablets

OfCom have published a report after conducting research on tablet usage in the UK.

The tablet computer has established itself as a must-have device in just five years with more than half of UK homes now owning one.

 

Apple’s iPad launched in the UK on 28 May 2010 and, alongside Android and other tablet devices, it is helping to shape the way we surf the internet, communicate and watch TV and video.

 

Tablets are proving very popular among people aged 35-54 with nearly two thirds of this age group (64%) having a tablet.

The rapid rise in popularity of tablets means that over half of UK households (54%) now have one1, up from just 2% in 2011.

The trend looks set to continue – 21% of households currently without a tablet told Ofcom they were likely to get one within the next 12 months.

 

According to the Ofcom report, seven in ten (71%) children aged 5-15 had access to a tablet at home by the end of 2014, up from just over half (51%) in 2013. And many kids do not even have to share a tablet with their parents. One in three children (34%) aged 5-15 have their own device – up from one in five (19%) in 2013.

Tablets are also proving popular with toddlers – one in ten (11%) of 3-4 year olds now have their own tablet to keep them entertained.

Using a tablet out and about

While more than one in three adults (37%) use a tablet to go online at home, only 15% appear to take their tablet with them when out and about – away from home, work or their place of study.

 

Ofcom’s report can be found here: http://consumers.ofcom.org.uk/news/five-years-tablets/

 

 

 

 

stuart.gilbertson
May 29, 2015
0
Share:

Welsh police force fined for not encrypting and losing video files

The ICO has issued South Wales Police with a £160,000 fine for losing a video recording which formed part of the evidence in a sexual abuse case.

Despite the DVDs containing a graphic and disturbing account, the discs were unencrypted and left in a desk drawer.

The recorded interview took place in August 2011 and the loss was discovered by staff after an office move in October 2011 but the security breach then went unreported for nearly two years due to lack of training. Although the DVDs were stored in a secure part of the police station, South Wales Police had no specific force-wide policy in place to deal with the safe storage of victim and witness interviews in its police stations.

A second interview had to be abandoned due to the victim’s distress and the DVDs have still not been recovered. The defendants were eventually convicted in court.

Anne Jones, Assistant Commissioner for Wales said: “Without any doubt we would expect a professional police force, in a position of trust, dealing with this type of highly sensitive information from victims and witnesses on a daily basis to have robust procedures to keep track of the personal data in their care.

In addition to the monetary penalty, the Information Commissioner has asked the police force sign an undertaking to ensure the changes are made to implement policies to stop any incidents happening again.

Edinburgh IT Support company, Consider IT, advises all users should take steps to ensure sensitive data is always encrypted.

stuart.gilbertson
May 18, 2015
0
Share:

Grooveshark has been shut down

The online streaming website Grooveshark has been shut down after losing its battle with the music industry on Thursday.

sz_grooveshark-2

The company reached a settlement agreement after being sued by a number of different record companies. One such suit brought by Universal Music Group was for $15 billion.

The notice on the company’s website says they “…have agreed to cease operations immediately, wipe clean all of the record companies’ copyrighted works and hand over ownership of this website, our mobile apps and intellectual property, including our patents and copyrights.”

Founded 9 years ago by three students at the University of Florida, this sees the end of the company that claimed to 35 million users they could “Play any song in the world, for free!”.

Other legitimate music streaming sites are available such as Spotify, Google Play, Beats Music, etc.

stuart.gilbertson
May 1, 2015
0
Share:
1 … 3 4 5 … 14
CONSIDER IT FACEBOOK CONSIDER IT Twitter CONSIDER IT Linkedin

Contact Us

0131 510 0110
[email protected]
Find Us

Customer Service

Contact Us
Our Locations
Case Studies

Information

About Consider IT
Domains
Privacy Policy
Terms & Conditions
Press Enquiries

© 2025 Consider IT Limited – All Rights Reserved
Registered office: Waterview House, 37 Shore, Edinburgh, EH6 6QU. Company Number: SC320341 | VAT number: GB 930 1862 42
Consider IT is a trading name of Consider IT Limited