Cyber Security Education

Cyber Security Education: Iranian hackers posed as academics at London’s School of Oriental and African Studies to conduct an online espionage campaign targeting experts on the Middle East. The hacking attempt was carried out by a group called itself ‘Charming Kitten’ and are widely thought to be operating behalf of Iran’s shadowy Revolutionary Guard. Iran — […]

managed service providers

The British government has vowed to create a legally binding cybersecurity framework for managed service providers (MSPs). The supply chain review comes in the wake of high-profile events like the SolarWinds compromise.

submarine cables

Indian telecoms conglomerate Reliance Jio will build two submarine cables to help it satisfy the country’s appetite for data. One of the cables is called IEX, short for India-Europe-Express, and will head west from Mumbai and connect to the Middle East and North Africa before landfalling in Italy. The cable may push further into Europe and down into Eritrea on the African continent.

internet democracy

In the old days of military coups, the power-mad colonel would storm the presidential palace and send his goons to take over the TV and Radio stations. Then a sombre officer appears on TV to declare the military had taken charge. To achieve a fig leaf of respectability the officer would offer a return to democratic rule at some suitably distant date in the future.

teams-online

Microsoft has had its very own ‘who, me?’ moment after being forced to apologise for a bug that spammed administrators of its popular Teams platform.

ransomware-pipeline

The hacking gang behind the Colonial Pipeline attack has started to point the finger at a rival gang – as the FBI launch a major investigation.

ATM Hacks

Criminals stuck at home during Covid pandemic steal cash from ATM’s with software hacks – Physical attacks plumet.

Used Microsoft Software

ValueLicensing is suing Microsoft for £270m in damages in the English High Court, alleging that the US company is trying to crush a multibillion-dollar market in second-hand versions of its software.

Multi-Cloud Network Transparency

Cloud Connectivity transparency ought to be considered as a critical component of any cloud, hybrid-cloud or multi-cloud deployment. Simplicity of a network overview is particularly important given the unique nature of Cloud Connect. Administrators and network engineers demands on time and resources are continually evolving and skills stretched to the limits.

Cyber Ransom

A nasty cyber gang claims to take a bite out of Apple with $50 million ransom. The gang of cyber criminals are demanding the Cupertino-based firm pay up the money or they will release Apple device blueprints.