,

When culture eats awareness for breakfast

European startup CLTRe founded by Kai Roer has spent the last couple of years examining the security awareness and user behaviour problem through the lens of security culture. Based on findings over the course of 2016, CLTRe has produced its first annual Security Culture report, co-written by Roer and Gregor Petric, Ph.D., an Associate Professor […]

,

The Growing Impact of Security Researchers

I’ve followed Scott Helme’s work for a while now and have been impressed with his approach. So was interested to find out that he had teamed up with BBC Click and Prof Alan Woodward to comprehensively dismantle a vendors claim to total security. Scott has published the whole story on his blog and The BBC Click […]

Understanding realities

In between all the politics and memes on twitter, you sometimes come across a genuinely interesting security conversation. My friend Quentyn Taylor, who happens to be a CISO posted this tweet that generated a lot of great commentary. and for those infosec people who just say “upgrade all your legacy”…well someday you too may work […]

BankBot malware targets Android Apps

On 17 April (Monday) the strain, dubbed “BankBot”, was discovered in an application called “HappyTimes Videos” on Google’s Play Store. In addition, experts from Securify, a Dutch cybersecurity firm, recently found another infected app there, titled “Funny Videos 2017”. The Trojan is able to pose as legitimate services, mostly banks and financial institutions. However, once […]

Intercontinental Hotel Credit Card Breach

The Intercontinental Hotels Group (IHG) has been forced to reveal yet another major data breach of customer card details over the latter part of 2016. In a lengthy missive on Friday, the group explained that an unspecified number of IHG hotels run as franchises were affected between September 29 and December 29 last year. via […]

IoT Botnet rivalry

Like Mirai, Hajime also scans the internet for poorly secured IoT devices like cameras, DVRs, and routers. It compromises them by trying different username and password combinations and then transferring a malicious program. However, Hajime doesn’t take orders from a command-and-control server like Mirai-infected devices do. Instead, it communicates over a peer-to-peer network built off protocols […]

Rise in Healthcare Breaches

A sharp spike in the number of health care data breaches was recorded in March with 39 incidents taking place compromising more than 1.5 million patient record. via 1.5 million records lost in March health care industry data breaches 1.5m records lost in March health care industry data breaches represents a rather unsettling trend. While […]