KRACK Attack Devastates Wi-Fi Security
The KRACK, or key reinstallation attack, disclosed today allow attackers to decrypt encrypted...
Hyatt Hit By Credit Card Breach, Again
Hyatt said its payment systems have been breached, exposing credit card data from...
Locky Gets Updated to ‘Ykcol’, Part of Rapid-Fire Spam Campaigns
Researchers say in a 30-day period cybercriminals behind the Locky ransomware have updated...
Down the Rabbit Hole with a BLU Phone Infection
Much-maligned BLU phones have been a privacy and spyware nightmare. Threatpost shares the...
Vendor BPC Banking Silent on Patching SQL Injection in SmartVista Ecommerce Software
A popular ecommerce platform sold in 60 countries suffers from a SQL injection...
Keeping your smartphones (and tablets) safe
Mobile technology is now an essential part of modern business, with more of...
Backing up your data
Think about how much you rely on your business-critical data, such as customer details,...
Protecting your organisation from malware
Malicious software (also known as 'malware') is software or web content that can...
Cyber Security: Small Business Guide (Infographic)
This advice has been produced to help small businesses protect themselves from the...
Avoiding phishing attacks
In a typical phishing attack, scammers send fake emails to thousands of people,...
Microsoft Patches Office Bug Actively Being Exploited
Microsoft’s Patch Tuesday security bulletin includes 62 fixes for vulnerabilities tied to Office,...
Internal Accenture Data, Customer Information Exposed in Public Amazon S3 Bucket
Global consulting firm Accenture is the latest giant organization leaving sensitive internal and...
Cyber Security: Small Business Guide
If you’re a small or medium-sized enterprise (SME) then there’s around a 1 in 2...
CyberUK 2017 – The Countdown Begins
In just five weeks (14 – 16 March), the UK’s information security community...
Security Industry Failing to Establish Trust
During the Virus Bulletin closing keynote, Brian Honan urged the security industry to...
US Top Law Enforcement Calls Strong Encryption a ‘Serious Problem’
U.S. Deputy Attorney General and other top cyber policy makers warn the use...
Cyber Security Body of Knowledge: scoping the knowledge areas
In Chris Ensor's blog 'Building the Cyber Security Body of Knowledge' he introduced the work being done in a project called the Cyber Security Body of Knowledge (CyBOK). At the time, the project was seeking contributions from the cyber security…
Attackers changing tactics & objectives
Experts say threats are not only breaches, ransomware and IP theft, but a threat to a way of life.
National Cyber Security Centre: One year on
I’m so proud to launch our annual review today, marking the first anniversary since the National Cyber Security Centre came into existence.
I can’t quite believe it’s been a whole year.
The review sets out what we’ve achieved, so…
2013 Yahoo Breach Affected All 3 Billion Accounts
A massive breach of Yahoo’s systems in 2013 impacted every account in existence at the time.
Windows Defender Bypass Tricks OS into Running Malicious Code
Researchers have developed a method for bypassing Windows Defender that will allow any malware to execute on a Windows machine.
Brightening the outlook for security in the cloud
We've recently worked with a variety of teams across the public sector to help them decide whether to move the functions of their older IT systems into the cloud, or to upgrade the software and servers they're using.
It's a question being asked…
Deloitte: ‘Very Few Clients’ Impacted by Cyber Attack
The Guardian citing sources at the company, claims attackers may have had access to Deloitte’s systems since October 2016.
Amazon S3 Again: Verizon Internal Credentials
Organisations continue to leak data through Amazon S3 with their lax attitudes toward data ownership & responsibility.
Secure development and deployment
Today we are pleased to share with you an alpha draft of our secure development and deployment guidance. You may be wondering, 'who this is aimed at?' And 'why is it in alpha?' This blog post will answer those questions.
Increased automation
We…
Modernising Windows 10 Management
Deploying an array of devices has many benefits for end users - choice of device and platform are obvious wins. But, having to manage multiple infrastructures can seriously add to the workload of IT Admins. It may not be a panacea, but Windows…
Air-Gapped Networks via CCTV Steal Data
Attackers can use surveillance cameras and infrared for bi-directional covert comms between the internal networks of organisations.
Cyber Security meet Engineering, Engineering meet Cyber Security…
Reading this year’s 'State Of The Nation' report (PDF), it struck me that civil engineering, like many kinds of engineering, is driven by the fundamental vision to make peoples’ lives better.
New digital technologies help this…
Artificial Intelligence Improves Password Guessing
Artificial intelligence is creeping into information security, one unexpected application has emerged. Passwords.
Cloud-Focused Firms Earn High Marks for Security
Companies pushing the cloud envelope are most likely to run safer cleaner code.

