Threat ManagementEU ministers rattle sabres at encrypted ISIS jihadi comms channelsAdrian BridgwaterAugust 23, 2016France and Germany discuss 'tapping' encrypted end-to-end networks such as WhatsApp and Skype
Threat ManagementNew Indian subcontinent APT group emergesAdrian BridgwaterAugust 11, 2016A new APT group has emerged on the Indian subcontinent, identified by ForcePoint as 'Monsoon'
Threat ManagementFireEye layoffs as cyber-criminals gorge on low-hanging ransomwareAdrian BridgwaterAugust 9, 2016Paradoxically, 'good' news for businesses and ransomware cyber-criminals alike appears to be bad news for security platform provider FireEye.
Application securityBusiness email compromise (BEC) phishing scams netting billions for criminalsAdrian BridgwaterJuly 12, 2016Your next scam du jour: targeted stings and swindles based on impersonating key personnel are hitting as many as 400 companies a day.
Compliance ManagementUN warns police are not up to targeting dark web superstoresAdrian BridgwaterJuly 5, 2016Not a place you want to go shopping, the 'anonymous online marketplace' was meant to protect civil liberties but is now better known as a nefarious network for the illicit drugs trade.
Threat ManagementMalware spawns botnet in 25,000 connected CCTV camerasAdrian BridgwaterJune 28, 2016Tens of thousands of security cameras are the newest recruits to an DDoS botnet, noted for its powerful and unrelenting attacks
Network SecurityGoToMyPC, but not until you reset your passwordAdrian BridgwaterJune 21, 2016Unfortunately, the GoToMYPC service has been targeted by a 'very sophisticated password attack', says GoToMYPC
Threat ManagementNorth Korea link surfaces in SWIFT banking attacksAdrian BridgwaterJune 1, 2016If the North Korea link is verified for the Swift heists we may now have a new axis-of-(banking)-evil with nuclear-armed bank robbers.
Critical Infrastructure SecuritySmart cities still dumb enough to be hackedAdrian BridgwaterApril 26, 2016The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.
MalwareBuffalo buffalo buffalo: malware that attacks malwareAdrian BridgwaterApril 19, 2016When two malware worlds collide: Thanatos malware attacks malware, then attacks your network.