News

Computer Vulnerabilities: How Safe Are Your Systems?

The first quarter of 2018 has recently just ended with a high number of critical vulnerabilities being discovered so far, from the early vibes of Spectre and Meltdown to Intel’s kernel leaking vulnerability up to the very recent Cisco smart install vulnerability.  Towards the end of last year, we discussed a few major attacks that […]

Find out more

Computer Vulnerabilities: How Safe Are Your Systems?

The first quarter of 2018 has recently just ended with a high number of critical vulnerabilities being discovered so far, from the early vibes of Spectre and Meltdown to Intel’s kernel leaking vulnerability up to the very recent Cisco smart install vulnerability.  Towards the end of last year, we discussed a few major attacks that […]

Find out more

Load More

The Anatomy of a Compromised Network (Part 2)

  In our last article, we began to examine the anatomy of a compromised network. We discussed what constitutes a compromised network and common ways by which network architectures get compromised. In this piece, we will be focusing mainly on how to identify a possible network compromise and discussing a few mitigation steps. Just like […]

Find out more

The Anatomy of a Compromised Network (Part 1)

A couple of years ago I had set up a honeypot to study the behaviour of botnets on smart systems. I was interested in how they become compromised and the speed at which different classes of remote commands are executed. One of the most interesting things that were observed was the seemingly normal behaviour several […]

Find out more

GDPR: EU regulators confirm the need for incident detection capability

The Article 29 Working Party has recently published updated guidance on the Personal Data Breach notification rules in Articles 33 and 34 of the General Data Protection Regulation (GDPR). The most important part of the update concerns the requirement for organisations to put in place incident detection technologies, which can ‘immediately’ detect whether a security incident has occurred. This obligation […]

Find out more

PoS Malware: How does it affect you?

2018 was welcomed in with quite a power variant of the point of sale (PoS) malware.  In January, security researchers discovered the UDPoS which disguises itself as an update for LogMeIn remote access software. As soon as a PoS terminal is infected with this particular malware, the malware creates a new system service to maintain […]

Find out more

Six Steps to an Effective Security Response Strategy

Cyber Security Incident Response Smarttech247

  “File A  now reads as xysjdsndhd.exe!  File B converting to hsdssdjsdjs.pdf Mary cannot get any file to open on her system! Is she the only one? John’s PC in accounting is experiencing the same issues! Lucy in HR also!!  Oh great! We have just been hit with Ransomware!” Cyber incidents have been on an […]

Find out more

Connected Future: Security Threats of Popular Technologies

The last seven years have witnessed an exponential growth in the development of computer technologies and the ease of life that comes as a result of them. About thirty years ago, the idea of having a fridge that orders groceries by itself once they run out or having a car that optimises its own operation […]

Find out more

Central Processor Unit (CPU) Architectural Design Flaws

Overview Google announced three major vulnerabilities that can be exploited in today’s central processing units (CPUs). Major processor vendors, operating system vendors, and application vendors were pre-notified so that they would be able to address this critical issue. Most modern CPU’s are affected. Description This collection is based on a number of articles, including those […]

Find out more

From EU GDPR to AI – Cyber Security Predictions For 2018

With 2018 approaching fast on the horizon, the cybersecurity community questions whether or not the lessons taught in 2017 will have fallen upon deaf ears.  2017 marks one of the biggest years in history for high-profile data breaches, and 2018 will be no different. As cyber-criminals become more skilled in their work and their technologies […]

Find out more

Cyber Attacks That Shook 2017

The year 2017 will go down in history as one of the most interesting years so far by having experienced a disproportionally large number of cyber attacks. From large corporate breaches to state sponsored cyber attacks, 2017 has to be one of the years with the greatest cyber meltdown ever recorded in history. In this […]

Find out more