Have I Been Pawned is a service whereby typing your email address you can check whether that same email appeared in a leaked or comprised database. The UK and the Australian governments are now using the service to keep an eye on their own domains...
Researchers have found numerous flaws in Advanced Micro Devices better known as AMD. The firm behind the findings is CTS-Labs. The attacks work on popular motherboards such as Tyan, ASUS, ASRock, Gigabyte, Biostar who all used AMD. The CPU...
DDOS or Distributed Denial Of Service attack are only getting larger and more devastating. Last week saw what is so far the most powerful DDOS attack when this was aimed at GitHub with record braking of 1.35 terabits per second. A day later it was...
A Google researcher at Google Project Zero discovered a number of flaws in a well known peer-to-peer file sharing application. The vulnerabilities “allow an attacker to infect a victim with malware or collect data on the users’ past...
For modern processing to optimise their data crunching, they do something called branch prediction. For example in a high level, if you have an IF statement and if x=1 you would do one thing and if x=0 would do another. What modern processors might...
The cyber security space is expending with tones of new firms popping up every year. There is a premium problem to be solved. In late we have seen the Endpoint market accused to have gone stale, and in the last couple of years we literally saw wars...
The Meltdown and Spectre are serious vulnerabilities and have wide reaching impact. They affect nearly every computer and device running current processor. Big vendors are affected including Microsoft, Apple MacOS, Google Android, ChromeOS as...
Motherboard put up a rather good digital security guide. It will be regularly updated and it is portable in the form of pdf.
DDE or Dynamic Data Exchange is a protocol that establishes how application interact and send messages to share data through shared memory. The bad guys unfortunately were leveraging a loophole to exploit this by using a booby-trapped document...
Estonia is a progressive country when it comes to the use of technology. It is an early adopter of innovative technology to make their population digital citizens. As with anything new there are challenges to overcome and for Estonia there is one...

