Research / High Tech (2)

What is 00153random02009d?

What is 00153random02009d?

The usefulness of randomness is obvious. However, the probabilistic nature of computers limits their usefulness with the concept. Subsequently, you would reasonably assume that a body like the gambling industry would understand such limitations, but apparently not.

Read Story

Hacking the Radio, and Other Analogue Vulnerabilities

Hacking the Radio, and Other Analogue Vulnerabilities

If the signal from your favourite radio station isn’t streaming smoothly to your dial, it may be malicious interference from someone who doesn’t appreciate the program you’re trying to listen to. That’s exactly what happened recently to a number of stations around the world where an i …

Read Story

Even More Evidence to Show Us the Dangers of Poorly Designed Smart Devices

Oh no!

The increasing scale and flexibility of DDoS attacks should be a wake-up call for IoT manufacturers as such breaches become more prevalent in both consumer and industrial automation systems. But who will be able to resolve the challenge of providing security for these devices as they …

Read Story

Russia Envisions a More Closed Internet

Russian bill No. 571793-6, which is also called Доктрина демократического развития интернета (the Digital Economy National Program), or “ДНП” for short would increase the government’s ability "flick the switch." First Published 18th February 2019 The frameworks for geographically-base …

Read Story

The Risks Applications Face From Central Package Repositories

The Risks Application Face From Central Package Repositories

When developer teams use a central place for sharing their applications or libraries of code, they open themselves to the risk that attackers might get in. And once in, malware can be implanted and distributed with ease. First Published 25th January 2019 Where are you keeping your pac …

Read Story

Updates on Supply Chain Level Backdoors and Magecart

It appears that the supply chain level backdoor has been thought of as a viable business model for quite some time. And now people (and governments) are asking the pointy questions. First Published 12th October 2018 For a nostalgic feel, Supermicro's latest quantum prototype comes in …

Read Story

Reddit's Hack & The Risks of Phone-Based 2-Factor Authentication

Reddit's Hack & The Risks of Phone-Based 2-Factor Authentication

While it is clear that the 2FA implementation was not at fault here, there are significant risks associated with phone based 2FA that warrant serious consideration before you make this type of authentication method available to users. First Published 6th August 2018 r/LetsHackReddit 4 …

Read Story

Dealing with the Increasingly Severe Cyber-Threat Landscape

Dealing with the Increasingly Severe Cyber-Threat Landscape

The severity of cyber attacks has increased at a rapid pace over the past several years. No longer is it just large companies that need to secure themselves from malicious actors; individual users now must consider how they can protect themselves too. First Published 27th July 2018 Th …

Read Story

How Attacks are Escalated

An attack takes place and either succeeds or fails. The reality however is more complicated. Attackers are often able to initially gain a minor foothold in the target and then over time leverage it into a more devastating attack. First Published 20th July 2018 Вверх, вверх, вверх! 3 m …

Read Story

Hacked Hotel Keys - Current and Historical

In a hotel room, the door lock forms the last line of defence against unauthorised access to a guest’s belongings. However, the F-Secure story of the “Hacked Hotel Keys” is way more complex and interesting. First Published 27th April 2018 I've got the key. I've got the secret. 4 min r …

Read Story

Subscribe by email