Top

Tag: Cyber Security

2017
2016
17 Sep

Five Questions to Ask When You’ve Been Compromised 1. Which systems and data were affected? 2. How did they do it? 3 . Who did this to us? 4. Is it really over? 5. Can it happen again? Modern security[…]

15 Sep

Anyone who has even the slightest amount of contact with the internet is familiar with the scenario: An email or actual piece of mail arrives from a company who apparently handles some part of your connected life. The letter calmly[…]

30 May

Learn How to Send Self-Destructing Emails To Your Friends In Gmail: What if we tell you that you can send a self-destructing email to your friends? That means the sent email will destroy itself after the receiver reads it. This is[…]

28 Mar

Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems. Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware[…]

28 Mar

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be[…]

14 Feb

Bringing cyber to the board Cyber crime costs British businesses £34bn a year* Not just an IT issue, boards need to take note of consumers’ awareness and cynicism about how their data is used. Building the right cyber strategy, with[…]

21 Jan

The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. Back in December when I revamped the SSH banner and started collecting the fingerprint I noticed an[…]

2015
25 Nov

The modern age is epitomised by our daily consumption and creation of digital content. If that includes photos, videos and software, then the question of storage arises – to keep the stuff you want to save. While the ever-burgeoning and[…]