Posts

Attackers can use surveillance cameras and infrared for bi-directional covert comms between the internal networks of organisations.

Reading this year’s ‘State Of The Nation’ report (PDF),  it struck me that civil engineering, like many kinds of engineering, is driven by the fundamental vision to make peoples’ lives better. New digital technologies help this by advancing functionality and enabling better ways of working. But they also introduce new vulnerabilities, and it’s important that we reduce the harm that might arise if these vulnerabilities are exploited. […]

Artificial intelligence is creeping into information security, one unexpected application has emerged. Passwords.

Companies pushing the cloud envelope are most likely to run safer cleaner code.

iOS 11 is out today with a new look and feel on the iPad. The release comes with eight patches for Apple iOS vulnerabilities.

The exploit affects Windows, iOS and Android. Spear phishing campaigns with the attachments are groundwork for future attacks.

Today we’ve added new guidance to our website, advising on two aspects of email security:…

VMware users are being encouraged to update due to a write vulnerability.

This guidance is intended to help you secure your organisation’s email in two…

15,000 insecure Elasticsearch servers with 4,000 hosting the Point-of-Sale malware strains Alina and JackPoS.