News

  • #InfosecurityEurope: Angoka Named UK’s Most Innovative Cyber SME of 2023

    PRIVACY PRIVACY The DSIT jury awarded the prize to the Belfast-based smart city security provider with a unanimous decision Read More

    Read More

  • Hybrid Microsoft network/cloud legacy settings may impact your future security posture

    PRIVACY PRIVACY Once upon a time, the boundary that I worried about and considered that I was responsible for stopped at my Active Directory domain and at the firewall that protected it. Then the boundary of my network moved from the computers under my control to the internet and the connected devices and cloud applications…

    Read More

  • #InfosecurityEurope: Internet of Things Continues to Pose Security Risk

    PRIVACY PRIVACY The growth of IoT and connected devices is contributing to an expanding attack surface, despite upcoming legal controls Read More

    Read More

  • Smashing Security podcast #327: Mark’s metaverse for minors, and getting down to business

    PRIVACY PRIVACY There’s some funny business going on on Google, and Zuckerberg’s $14 billion bet on the metaverse is beginning to look a little childish… All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Read More

    Read More

  • Why you should review the security of your MSSQL servers

    PRIVACY PRIVACY Brute-force credential guessing attacks against database servers are ramping up with MSSQL being at the top of the target list. That’s because attackers can leverage the many extensibility features that Microsoft’s database server provides to integrate with other Windows components and features to elevate their privileges and gain full control of the underlying…

    Read More

  • Why Malware Crypting Services Deserve More Scrutiny

    PRIVACY PRIVACY If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good deal of time trying to disguise or “crypt” your malware so that it appears benign to antivirus and security products. In fact, the process of “crypting” malware is sufficiently complex and time-consuming that most serious…

    Read More

  • Ransomware attacks pose communications dilemmas for local governments

    PRIVACY PRIVACY In the early morning of May 3, the City of Dallas, Texas, was hit by a ransomware attack, for which the Royal ransomware gang later took credit. The city’s police, fire rescue, water service payment, and development systems, among others, were significantly hampered by the incident, forcing many departments to revert to handwritten…

    Read More

  • #InfosecurityEurope Hall of Fame: Becky Pinkard, Managing Director of Global Cyber Operations, Barclays

    PRIVACY PRIVACY Infosecurity Europe inducts Becky Pinkard, Managing Director of Global Cyber Operations at Barclays, into the Hall of Fame Read More

    Read More

  • #InfosecurityEurope: From Passion to Profession, Becky Pinkard’s Dedication to Cybersecurity

    PRIVACY PRIVACY Infosecurity Europe inducts Becky Pinkard, Managing Director of Global Cyber Operations at Barclays, into the Hall of Fame Read More

    Read More

  • Ethical Problems in Computer Security

    PRIVACY PRIVACY Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote excellent paper on ethical thinking within the computer security community: “Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversation“: Abstract: The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to…

    Read More

News, Advisories and much more

Exit mobile version