Research

A New Approach to Cyber Ransoms

A New Approach to Cyber Ransoms

With Ransomware, critical data is encrypted and then used to extort payment from the owners of said data. However, are organisations like Apple more likely to eat the cost than give in due to their strong security culture? First Published 30th March 2017 At what cost will Apple protec …

Read Story

US Indictment of 4 Alleged Russian Cyber Attackers

US Indictment of 4 Alleged Russian Cyber Attackers

The US Department of Justice unsealed a grand jury indictment against four men, including two officers of Russia’s Federal Security Service for engaging in cyber attacks on behalf of Russian intelligence. First Published 16th March 2017 A 'Perry Mason moment' it was not. 4 min read | …

Read Story

A Look at the Vault 7 Leaks

 A Look at the Vault 7 Leaks

Wikileaks released a set of documents, which are allegedly a part of the CIA arsenal. The release was named Vault 7, a compilation of secret-classed files from the CIA’s Center for Cyber Intelligence. First Published 9th March 2017 The holiday residence of Mr. J Assange - professional …

Read Story

A Rare Glimpse Into the Mechanics of a Major Breach

It’s almost inconceivable that Yahoo! suffered a breach of over 500 million user accounts, and it wasn’t even detected by Yahoo’s management team until years later. Yet here we are. First Published 2nd March 2017 "Database backups have been leaked"... yeah, um, that should be fine, ri …

Read Story

Subscribe by email