Research / Infosec Culture (4)

Thinking of Cybersecurity in Relative Terms

There is an enormous disconnect between industry experts, reporters and users when discussing cybersecurity incidents and risks. This leaves a chasm of misunderstanding regarding the severity and scope of what is possible. First Published 9th October 2019 | Latest Refresh 8th February …

Read Story

The Logic Behind Suing Hackers

The Logic Behind Suing Hackers

Microsoft successfully sued a network of Russian “Fancy Bear” (APT28) hackers, which has been blamed for many cyber attacks, including the DNC hack in 2016. Wait... is Microsoft actually suing hackers?!? First Published 25th August 2017 | Latest Refresh 23rd January 2022 Microsoft get …

Read Story

How to Ask for Honest User Feedback on Your IT Security Training Program

How to Ask for Honest User Feedback on Your IT Security Training Program

Both tech and non-tech staff understand how important IT security is, and they will happily tell you what they think of your training initiatives if you ask them. Are you ready to hear it? And even if you are, what are you going to do next?

Read Story

The Changing Image of Cyber Warfare

The evolution of cyber attacks has raised the profile of cyber warfare. For example, one cyber attack against state-owned Saudi Aramco almost destroyed the company’s entire computer system. The attack was rated as being capable of causing $150 billion in damage, which would rank it eq …

Read Story

Pegasus and the Digital Arms Trade

Pegasus and the Digital Arms Trade

A high-profile divorce case has shown that the elite can indeed deploy government-level espionage spyware tools for their own personal use, and it's more common than you think. So, how did we get here?

Read Story

Electoral Interference, Restrictions and Anonymity

Electoral Interference, Restrictions and Anonymity

The lack of international consensus on what exactly the Restrictive Internet Censorship and Freedom of Information laws should not have created a high-stakes game of political 'cat and mouse'. First Published 19th October 2016 Someone might be without their 'How to Frontside Smith Gri …

Read Story

Mobile App Hype and Criminal Activity

Mobile App Hype and Criminal Activity

While Pokemon Go promised to bring in more players, hackers counted on the excitement generated by the launch to spread malware among users until the location services were fully available worldwide. First Published 13th July 2016 | Latest Refresh 13th September 2021 I choose you, vag …

Read Story

A Post-Hack Crisis, Escalation of Rhetoric and Where to Place Blame

A Post-Hack Crisis, The Escalation of Rhetoric and Where to Place Blame

Widespread accusations towards the Russian government services and the apparent lack of a “smoking gun” after the 2016 US election raises the question of whether the United States brought on a second post-hack crisis of their own creation.

Read Story

When Securing Your Company Data, Please Remember the Promiscuous

Please Remember the Horny Men of 2015

Security is never stagnant. At best, it’s a game of cat and mouse where you try to outsmart the other party — with new security threats arising when you least expect them. However, there are some valuable lessons from the past that many have yet to learn.

Read Story

Government Eavesdropping and Onsite Backdoors

Peek-a-boo!

In the name of ‘national security’, there continues to be repeated calls for tech organisations to build backdoors into their systems to enable government access. The overarching concern is that corporations use of backdoors will undermine and weaken encryption methods, and there are …

Read Story

Subscribe by email