Author: Susan Morrow
In April, Google’s Project Zero released information about how any mobile device using a Broadcom chipset (used in both Android and IOS phones) were vulnerable to being hacked using a malicious WiFi. The attack could be carried out against any phone with a Broadcom chip, within the WIFi range. The...Continue Reading
The concept of using remote web servers to host and manage data and applications, in other words, Cloud computing, is a paradigm shift in how we use computing at work (and home). Cloud computing has had a rocky road to acceptance, but it is now embraced by just about everyone with 95% of respondents...Continue Reading
Yesterday afternoon, UK time, I received a text message from a friend, it said:“It’s happening again, they’ve told us to immediately switch off our computers”This friend works in a very large and busy hospital. Two months ago, the same person sent me a similar text, this time telling...Continue Reading
I was taught some time ago whilst learning to do a little DIY, that you really need to use the right tool for the job to get a good result. The same is true for cybercrime. Cybercriminals need to make sure that they pick from the wide choices of malware and methods, the right combination to get the ...Continue Reading
One of the areas I am interested in when it comes to cyber security is the use of psychology and human behavior as part of the hack. It certainly seems, that in the 20 years that I’ve been working within the industry, that this aspect of cybercrime has been honed to perfection. I like to look at c...Continue Reading
Forget space travel to Mars, human beings are building their own brave new world in cyberspace in the form of the ultimate in connectivity, the Internet of Things (IoT). Internet-connected devices are touching pretty much every aspect of our lives. As consumers, we are embracing health wearables lik...Continue Reading
Hardly a week goes by without a headline shouting about yet another data breach. One of the biggest ever happened in January, to email marketing company Red City Media. Security researcher Chris Vickery of On 21, October 2016, arguably the most significant Internet cyber attack in history occurred. Big sites like Twitter and Netflix suddenly weren’t working. Dyn, who handle DNS routing for some of the world's best-known Internet companies, had been attack...
On 21, October 2016, arguably the most significant Internet cyber attack in history occurred. Big sites like Twitter and Netflix suddenly weren’t working. Dyn, who handle DNS routing for some of the world's best-known Internet companies, had been attack...Continue Reading
Be Informed. Stay One Step Ahead.
Sign up for our newsletter and stay up to date with the latest industry news, trends, and technologies