Opinions & Analysis

This week a report emerged which claimed that teenagers are not only shopping online, but they are meeting strangers in the real world too. The report from (ISC)2 revealed that of the 1,162 pupils it surveyed, 43 per cent use the internet every day, 42 per cent have used a web cam and six per cent have posted a picture of themselves online or sent a picture to someone by text message that they would not want...

Read more

Now four months on from the revelations of Prism from Edward Snowden, it seems that businesses are the next to respond to the surveillance. This week it has been reported that both Germany's Deutsche Telekom and Brazil's Government have announced plans to offer services that deliberately bypass the United States and UK to avoid surveillance by the NSA and GCHQ respectively. According to the German news website Spiegel, Deutsche Telekom is proposing a specified data path...

Read more

If you are prepared to put in the time and effort, there can be great reward in vulnerability research and disclosure, not to mention credit and kudos in the security community. This week that sits in the shape of a blue hat sitting firmly on the head of Brit James Forshaw, head of vulnerability research at Context Information Security, who discovereda mitigation bypass technique in Internet Explorer 11 during its beta testing period in the summer. I'm...

Read more

Yesterday saw the “opening” of the National Crime Agency that will centralise crime investigation and fighting, and tackle all types of misdemeanours. The concept was originally proposed as part of the government’s Cyber Security Strategy, announced in 2011, and with this latest move it is positive that the actions are still being completed. The plan then was for a cyber crime unit within the National Crime Agency that will build on the Metropolitan Police's eCrime Unit, giving...

Read more

This week marked the first week of the now annual ENISA cyber security month and as part of the agency for network and information security's activities, awareness of citizens is key. Speaking to IT Security Guru, head of core operations at ENISA Steve Purser, said that after the “pilot exercise” in 2012, he felt that the effort was going very well on its fourth day and after a lot of preparations and effort, there was a lot...

Read more

The big news of this week occurred due to the complaint and warrant made by the FBI for the arrest of Ross William Ulbricht, aka Silk Road founder “Dread Pirate Roberts”. The "dark" website, not hosted on the world wide web but accessible via The Onion Ring (TOR) reportedly had close to a million users and allowed registered users to dabble in art and erotica, but also in drugs, weapons and malware. The issue here, apart from...

Read more

Today marks the start of the inaugural European Cyber Security Month, a continent-wide scheme intended to raise awareness of security, privacy and information issues. Organised by the European Union agency for network and information security (ENISA), the campaign for the UK will include poster competitions, an awareness week on behaviour, ethical hacking, viruses and malware, advice on using your home computer as well as social media and email awareness campaigns. Following the various UK-based day...

Read more

The way that the industry collectively came together to offer a near $4,000 bounty for the first person to break Apple's Touch ID fingerprint scanner shows an interest in research, and how determined we are to show fallibility. In the story, the challenge to break Touch ID, introduced as part of iOS 7 last week, was launched by independent security researchers Robert Graham and Nick DePetrillo, who put their own money up in order to create a bounty that...

Read more

he method of infiltration and exfiltration may stay the same, but how sophisticatedly it is done changes. While the rise of advanced threats has seen more sophisticated techniques developed and used, in some cases less sophisticated methods and “back to basics” techniques are used. Earlier this year, Trusteer’s CTO Amit Klein blogged about two malware families, Tinba and Tilon, saying that they were examples of malware going “back to basics”. Recently, Trusteer identified a new variant of...

Read more

This week it was announced that NSA chief Keith Alexander was keen to expand the sharing of threat information in order to better protect the US government and its allies. Bearing in mind the issues the NSA has faced over the past few months: from Snowden to conference heckling, this could appear to be a good PR stunt by the agency to better repel criticism in the light of doing something positive. It’s not like the public...

Read more
Page 37 of 38 1 36 37 38