North Korea and the US on common ground

ExploitYou’ve probably heard of zero-day exploits but might not know what exactly it means. It’s a type of virus that is extremely dangerous, and relatively common. Traditional antivirus detection doesn’t halt zero-day exploits however, they can be stopped. And intriguingly, governments around the world from North Korea to the US pay a lot of money for information on zero-day discoveries – so they can turn them against others.

Read more


Uncertain New World

Uncertain New WorldSuch as been the far reaching influence of technology that today a measure of success is the technology we use whether it’s the latest smartphone or a device with supercomputing power. That said, the rapid pace of change that follows technology advancements means we are also more open to cyber mishaps and hacks that can have a huge impact on our lives, and in the most extreme cases bring life itself it to a juddering halt.

Read more


Security predictions for 2015

Security predictions 2015As law enforcement ramps up its endeavours against cyber criminals and new mobile payment systems gather steam we can expect to see hackers turn their attentions to developing malware that covers their tracks as well begin probing systems such as Apple Pay and smartphone based payment methods.

We can also expect more of the same in terms of high profile targeted attacks, while low level state-sponsored attacks will become the norm rather than the exception.

Read more


The Sony hack – what’s missing?

sony hackedAmid the gossip, fury and diplomatic activity over the Sony hack a few important points have been overlooked; thousands of employees had their personal information posted online proving that many organisations can’t be trusted to provide security and cyber actions by nation states are here to stay accompanied by ever louder cries of denial.

Read more


Freaky phones and snooping spooks

Internet securityThe history of computer security reads like the progression from the clubs and crude stone axes of Neanderthal man (and woman) to the pumping pistons and huge steel wheels of the industrial revolution, except it has largely happened in the past 40 years. Looking back at online security in the past 40 years we’ve gone from simple virus detection to mass surveillance of entire populations in a startlingly short time.

Read more


Nailing it down

Security policyRunning a small business? Working from home? Then you need to nail down some basic protective measures to ensure you and yours are protected against loss.

A foundation is so fundamental to a house no one would even consider moving anywhere near it much less into it. Security policies are so fundamental to ensuring a business is kept safe that no organisation should set sail without one. But many do.

Read more


A plague on your smartphone

BYODYou may see your wonderful smartphone as an electronic brain in your pocket but IT departments the world over see them as potential plague-carrying devices that can wreak untold damage to a company network from mass data theft to viral infections. You can play your part in ensuring your company’s accounts are not plundered by getting up to speed with the issues and getting ahead of the game.

Read more


Disaster averted: AliExpress website vulnerability

Alibaba site vulnerabilityDespite the security measures organisations put in place, there are often glaring holes. Just recently, one of these could have exposed the personal data of millions of people – if it wasn’t for a sharp application security researcher.

A recently discovered vulnerability on the  AliExpress website potentially exposed the personal information of millions of people.

Read more


2014 – Celebrities exposed, political points made and a game of whack-a-mole just begun

looking back in 2014As the year draws to a close there has certainly been a spike in criminal cyber activity. In a sense, events this year are no different than previous years except the scale of activity is increasing and the damage more widespread. There’s also the irrevocable sense that the cyber and physical worlds are now so finely entangled that actions in one inevitably echo loud and clear in the other.

Read more


Biggest online hacks of all time

data breachEnormous online data loss drives a huge underground industry in phishing and the sale of personal data. It fuels cybercrime and has given rise to many websites on the dark web that trade in personal data. It provides hackers with a reason for being and stokes the fires of nefarious online behaviour. And it is happening with alarming frequency.

Read more