Research / Infosec Culture (10)

Understanding the Password Black Market

Some leaked password lists are so huge that they can't be ignored. However, some lists are full of junk credentials, which are meaningless to most. So why would a hacker go to the effort of posting breached passwords if they are worthless? First Published 11th May 2016 People love qua …

Read Story

Car Hacking, Foreign Hacking & Bitcoin

Car Hacking, Foreign Hacking & Bitcoin

While security experts argue if a man named Craig Wright is the one and only Satoshi Nakamoto, the US Supreme Court just gave the FBI permission to hack any computer they have a warrant for. First Published 4th May 2016 Satoshi Nakamoto? Craig Wright? This stock image model? 3 min rea …

Read Story

Cyberattacks on the Developing World

Cyberattacks on the Developing World

The Philippines has emerged as a new hot spot for cybercriminals. While it is considered the third most affected country in the world, Bangladesh claims the top spot, with attacks often bouncing between the two jurisdictions. First Published 27th April 2016 The cyber-sophistication le …

Read Story

Phone Hacking

Phone Hacking

SS7 has over 30 years of history, but the hacking demonstration opens a scary prospect for everyone. The researchers proved that the SS7 network can be easily abused in order to spy on people's phone conversations and track their location. First Published 20th April 2016 "You don't sa …

Read Story

Pirates & Hackers

Pirates & Hackers

Shipping companies now claim that hackers are able to monitor the stock control, ship schedules, and routes of ships, allowing the pirates to track their targets, identify specific cargo, and execute physical attacks with new levels of speed and efficiency. First Published 13th April …

Read Story

Hack the Pentagon

Hack the Pentagon

The Hack the Pentagon program is meant to encourage security researchers to find weaknesses in their systems. This initiative will offer participants financial rewards in place of legal punishment for participating in the program. First Published 6th April 2016 The US Department of De …

Read Story

Brussels, Crypto, Privacy & Security

Brussels, Crypto, Privacy & Security

The debate about internet privacy and the role of cryptography in protecting our communications has been raging for years. However, cryptography is only one step in a long chain of security measures meant to protect data from unauthorised access. First Published 30th March 2016 | Late …

Read Story

Celebrity Hacks & Encryption Policy

Celebrity Hacks & Encryption Policy

There is an increase in hacking into celebrity accounts to steal photos, financial data and medical records. But you would think high-profile public individuals would have more secure data protection measures in place, right? First Published 23rd March 2016 For some reason, celebritie …

Read Story

Ransomware & Soft Targets

Ransomware is becoming a huge problem, and Healthcare providers are being targeted more than other industries because they are generally viewed by criminals as soft targets with a proven ability to pay up. First Published 16th March 2016 Hospitals are seen as targets that have a highe …

Read Story

Mac Ransomware

Mac Ransomware

Considering the highly developed nature of Mac OS and its users’ tendencies when updating, it is not surprising that malware attacks are usually less frequent than for other platforms. But that doesn‘t mean that this type of attack doesn’t happen. First Published 9th March 2016 Ransom …

Read Story

Subscribe by email