Videos

Guru News Snapshot – 30th October

Guru News Snapshot – 30th October

Today's Guru

Opinion and Analysis

Breaking hypervisors and virtual security

Breaking hypervisors and virtual security

The “hype” over the Xen hypervisor flaw put the technology back in the spotlight.   Not specifically covering virtualisation or cloud in any great depth, this hasn’t been an area I have focused on, but we do cover flaws and this was of interest. I recently caught up with hypervisor vendor Bromium, whose security researcher (…read more)

A second leaker – is it pure speculation?

A second leaker – is it pure speculation?

24 hours ago, the internet was ablaze with talk of a “second leaker” being identified by the FBI.   The second leaker, whom cryptographer Bruce Schneier actually deemed to be the third leaker (behind Edward Snowden and the person passing secrets about the Angela Merkel surveillance story, the TAO catalog and the X-KEYSCORE rules), was suggested at the end (…read more)

Securing your weakest data breach links

Securing your weakest data breach links

Data breaches through insiders—or trusted employees, contractors and vendors who have access to your network—are becoming more and more common.   For example, the recent JP Morgan breach began when hackers compromised one employee’s username and password to a web development server. The major breach at US retailer Target started when hackers stole credentials from (…read more)

Scam of the Week

US-CERT warns on Ebola scams

US-CERT warns on Ebola scams

The world is talking about the Ebola virus, and unsurprisingly this has not stopped cyber criminals and scammers from jumping onboard also.   In fact, there have been so many scams that US-CERT has issued a warning about phishing emails that may contain links that direct users to websites which collect personal information such as (…read more)