Research / Infosec Culture (10)

Social Media Attacks

Social media are the preferred communication channel for many in today's world. However, it comes with a new wave of social engineering attacks that most do not understand. First Published 1st June 2016 Hacks of social media accounts are attractive due to the 'trust transfer' that alr …

Read Story

Risks of Bitcoin

Not only is Bitcoin a volatile market, and even if you have some knowledge of trading, most exchanges do not have adequate security in place. This has been proven in the past, and will be proven again and again in the future. First Published 18th May 2016 Choose your exchange wisely. …

Read Story

Understanding the Password Black Market

Some leaked password lists are so huge that they can't be ignored. However, some lists are full of junk credentials, which are meaningless to most. So why would a hacker go to the effort of posting breached passwords if they are worthless? First Published 11th May 2016 People love qua …

Read Story

Car Hacking, Foreign Hacking & Bitcoin

Car Hacking, Foreign Hacking & Bitcoin

While security experts argue if a man named Craig Wright is the one and only Satoshi Nakamoto, the US Supreme Court just gave the FBI permission to hack any computer they have a warrant for. First Published 4th May 2016 Satoshi Nakamoto? Craig Wright? This stock image model? 3 min rea …

Read Story

Cyberattacks on the Developing World

Cyberattacks on the Developing World

The Philippines has emerged as a new hot spot for cybercriminals. While it is considered the third most affected country in the world, Bangladesh claims the top spot, with attacks often bouncing between the two jurisdictions. First Published 27th April 2016 The cyber-sophistication le …

Read Story

Phone Hacking

Phone Hacking

SS7 has over 30 years of history, but the hacking demonstration opens a scary prospect for everyone. The researchers proved that the SS7 network can be easily abused in order to spy on people's phone conversations and track their location. First Published 20th April 2016 "You don't sa …

Read Story

Pirates & Hackers

Pirates & Hackers

Shipping companies now claim that hackers are able to monitor the stock control, ship schedules, and routes of ships, allowing the pirates to track their targets, identify specific cargo, and execute physical attacks with new levels of speed and efficiency. First Published 13th April …

Read Story

Hack the Pentagon

Hack the Pentagon

The Hack the Pentagon program is meant to encourage security researchers to find weaknesses in their systems. This initiative will offer participants financial rewards in place of legal punishment for participating in the program. First Published 6th April 2016 The US Department of De …

Read Story

Brussels, Crypto, Privacy & Security

Brussels, Crypto, Privacy & Security

The debate about internet privacy and the role of cryptography in protecting our communications has been raging for years. However, cryptography is only one step in a long chain of security measures meant to protect data from unauthorised access. First Published 30th March 2016 | Late …

Read Story

Celebrity Hacks & Encryption Policy

Celebrity Hacks & Encryption Policy

There is an increase in hacking into celebrity accounts to steal photos, financial data and medical records. But you would think high-profile public individuals would have more secure data protection measures in place, right? First Published 23rd March 2016 For some reason, celebritie …

Read Story

Subscribe by email