Bruce Schneier is a well known cryptographer, author and cyber security expert. Here is Bruce answering Reddit community’s questions in a “Ask Me Anything” style. If you ignore his book promotion mention, there are a lot of good...
The General Data Protection Regulation protects European (GDPR) citizens’ data. This forces organisations to ensure measures are in place to uphold the safeguard of this data if they are hosting, exchanging or transacting with it. The...
Here is an interesting research from Ruhr-Universität Bochum & New York University Abu Dhabi detailing attack vectors on LTE protocol -better know as 4G.
The first government owned organisation in the Middle East closed its data centers and moved its entire IT infrastructure to the cloud, ITP reports. This is largely to reduce cost but also improve security. “We are proud to be the first...
I am sure you’ve heard a lot about the EU’s General Data Protection Regulation by now. The wait is over and GDPR has arrived. It has far wider reach than people think. Review what it means and it’s reach here but here is what you...
Cyber security is the act of having a safeguard or countermeasures in order to mitigate a potential risk. When I talk to clients who are looking at improving their security posture I often remind them that they need to strike a balance between...
Have I Been Pawned is a service whereby typing your email address you can check whether that same email appeared in a leaked or comprised database. The UK and the Australian governments are now using the service to keep an eye on their own domains...
Researchers have found numerous flaws in Advanced Micro Devices better known as AMD. The firm behind the findings is CTS-Labs. The attacks work on popular motherboards such as Tyan, ASUS, ASRock, Gigabyte, Biostar who all used AMD. The CPU...
DDOS or Distributed Denial Of Service attack are only getting larger and more devastating. Last week saw what is so far the most powerful DDOS attack when this was aimed at GitHub with record braking of 1.35 terabits per second. A day later it was...
A Google researcher at Google Project Zero discovered a number of flaws in a well known peer-to-peer file sharing application. The vulnerabilities “allow an attacker to infect a victim with malware or collect data on the users’ past...