
DUHK Attack Exposes Gaps in FIPS Certification
The DUHK Attack leverages a 20-year-old random number generator flaw to recover private...

BadRabbit Ransomware Attacks Hitting Russia, Ukraine
A ransomware attack called BadRabbit has put a halt to business inside a...

Latest Sofacy Campaign Targeting Security Researchers
Sofacy has been using a lure document connected to a cyber conflict conference...

Cloudy with a chance of transparency
(Image: 'Cloudy with a Chance of Meatballs' - Sony Pictures Animation) In my previous...

ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance
This page contains guidance for people who want to understand and reduce the...

Hackers Take Aim at SSH Keys in New Attacks
SSH private keys are being targeted by hackers who have stepped up the...

Cyber Security: Small Business Guide (PDF Version)
A summary of low cost, simple techniques that can improve cyber security within...

Automating UEFI Firmware Updates
In our previous blog post we talked about the state of UEFI firmware running on...

Oracle Patches 250 Bugs in Quarterly Critical Patch Update
Three critical SQL injections vulnerabilities in Oracle's popular E-Business Suite make up a...

Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible
A flawed Infineon Technology chipset left HP, Lenovo and Microsoft devices open to...

KRACK Attack Devastates Wi-Fi Security
The KRACK, or key reinstallation attack, disclosed today allow attackers to decrypt encrypted...

Hyatt Hit By Credit Card Breach, Again
Hyatt said its payment systems have been breached, exposing credit card data from...

Locky Gets Updated to ‘Ykcol’, Part of Rapid-Fire Spam Campaigns
Researchers say in a 30-day period cybercriminals behind the Locky ransomware have updated...

Down the Rabbit Hole with a BLU Phone Infection
Much-maligned BLU phones have been a privacy and spyware nightmare. Threatpost shares the...

Vendor BPC Banking Silent on Patching SQL Injection in SmartVista Ecommerce Software
A popular ecommerce platform sold in 60 countries suffers from a SQL injection...

Backing up your data
Think about how much you rely on your business-critical data, such as customer details,...

Protecting your organisation from malware
Malicious software (also known as 'malware') is software or web content that can...

Cyber Security: Small Business Guide (Infographic)
This advice has been produced to help small businesses protect themselves from the...

Avoiding phishing attacks
In a typical phishing attack, scammers send fake emails to thousands of people,...

Keeping your smartphones (and tablets) safe
Mobile technology is now an essential part of modern business, with more of...

Microsoft Patches Office Bug Actively Being Exploited
Microsoft’s Patch Tuesday security bulletin includes 62 fixes for vulnerabilities tied to Office,...

Internal Accenture Data, Customer Information Exposed in Public Amazon S3 Bucket
Global consulting firm Accenture is the latest giant organization leaving sensitive internal and...

Cyber Security: Small Business Guide
If you’re a small or medium-sized enterprise (SME) then there’s around a 1 in 2...

CyberUK 2017 – The Countdown Begins
In just five weeks (14 – 16 March), the UK’s information security community...

Security Industry Failing to Establish Trust
During the Virus Bulletin closing keynote, Brian Honan urged the security industry to...

US Top Law Enforcement Calls Strong Encryption a ‘Serious Problem’
U.S. Deputy Attorney General and other top cyber policy makers warn the use...

Cyber Security Body of Knowledge: scoping the knowledge areas
In Chris Ensor's blog 'Building the Cyber Security Body of Knowledge' he introduced the work being done in a project called the Cyber Security Body of Knowledge (CyBOK). At the time, the project was seeking contributions from the cyber security…

Attackers changing tactics & objectives
Experts say threats are not only breaches, ransomware and IP theft, but a threat to a way of life.

National Cyber Security Centre: One year on
I’m so proud to launch our annual review today, marking the first anniversary since the National Cyber Security Centre came into existence.
I can’t quite believe it’s been a whole year.
The review sets out what we’ve achieved, so…

2013 Yahoo Breach Affected All 3 Billion Accounts
A massive breach of Yahoo’s systems in 2013 impacted every account in existence at the time.