Research

Artificial Intelligence and Malware Detection

Artificial Intelligence and Malware Detection

The term 'artificial intelligence' is no longer a mere buzzword in the antivirus industry. But does it mean it is the holy grail for malware detection or the perfect weapon against malware developers? Not quite.

Read Story

How to Ask for Honest User Feedback on Your IT Security Training Program

How to Ask for Honest User Feedback on Your IT Security Training Program

Both tech and non-tech staff understand how important IT security is, and they will happily tell you what they think of your training initiatives if you ask them. Are you ready to hear it? And even if you are, what are you going to do next?

Read Story

The Changing Image of Cyber Warfare

The evolution of cyber attacks has raised the profile of cyber warfare. For example, one cyber attack against state-owned Saudi Aramco almost destroyed the company’s entire computer system. The attack was rated as being capable of causing $150 billion in damage, which would rank it eq …

Read Story

Pegasus and the Digital Arms Trade

Pegasus and the Digital Arms Trade

A high-profile divorce case has shown that the elite can indeed deploy government-level espionage spyware tools for their own personal use, and it's more common than you think. So, how did we get here?

Read Story

The Privacy and Security of COVID-19 Tracking Apps

COVID-19 tracking apps are now commonplace, despite numerous security concerns from public advocacy groups and segments of wider society. First Published 12th May 2020 | Latest Refresh 30th November 2021 The race to launch Covid apps might have overlooked some basics. 3 min read | Ref …

Read Story

India: Political Parties, Risk and Degrees of Attacks

The defacement of political party websites is nothing new, but what motivates them can be dynamic, as Indian Prime Minister Modi found out two days before an official visit to the United States. But since then, media have made the idea of the Indian Hacker increasingly more popular. F …

Read Story

Crypto Currency Breaches, Continued

Some time ago, CoinDash, an Israeli cryptocurrency startup, was using their ICO to raise $10 million. Just hours after it started, an unknown attacker compromised the website and took $7 million of it. Then, many were shocked this could happen. Today, crypto hacks are commonplace. Fir …

Read Story

Electoral Interference, Restrictions and Anonymity

Electoral Interference, Restrictions and Anonymity

The lack of international consensus on what exactly the Restrictive Internet Censorship and Freedom of Information laws should not have created a high-stakes game of political 'cat and mouse'. First Published 19th October 2016 Someone might be without their 'How to Frontside Smith Gri …

Read Story

Mobile App Hype and Criminal Activity

Mobile App Hype and Criminal Activity

While Pokemon Go promised to bring in more players, hackers counted on the excitement generated by the launch to spread malware among users until the location services were fully available worldwide. First Published 13th July 2016 | Latest Refresh 13th September 2021 I choose you, vag …

Read Story

The Trouble with Crowd Sourced Data

The Trouble with Crowd Sourced Data

A Mapbox GL JS v2.0.2 user maliciously renamed New York City. Within seconds of the attack, eBay, Snapchat, Foursquare, CitiBike and Zillow automatically fell in line, and NYC was gone. First Published 31st August 2018 The wisdom (and stupidity) of crowds. Baaaahstards! 4 min read | R …

Read Story

Subscribe by email