Spent a day with the BBC, and hosted a tweetchat. Just an ordinary day, no biggie.Link to the tweetchat moment: GDPR tweetchat Tweetchat blog isn’t about, but keep your eye on http://ift.tt/1s8wHrF for info
https://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.png00Javvad Malikhttps://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.pngJavvad Malik2017-07-19 11:39:322017-07-19 11:39:32RANT, Steelcon, and that shirt!
It’s a parody deliberately intended to be as bad as possible as a form of artistic expression depicting the state of security in the world today set against the backdrop of the rise of ransomware. Seeking to answer the mysteries of humans, life, and the universe.
If you don’t know Wolf Goerlich, you should check out his youtube channel. He started less than 2 years ago making short security videos during his commute to work. Youtube.com/user/jwgoerlich This method of utilising his commute time for something practical, coupled with his consistency has allowed him to build up a large collection of, well […]
https://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.png00Javvad Malikhttps://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.pngJavvad Malik2017-05-25 18:11:202017-05-25 18:11:20Things I learnt from Wolf
Whenever a calamity befalls, it’s only natural for people to try and rationalise and identify the problem. As is now happening with the WannaCry ransomware outbreak that affected the UK’s NHS service, and other services in over 100 countries. People are discussing what should have been done to prevent it. On one hand, there’s a […]
https://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.png00Javvad Malikhttps://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.pngJavvad Malik2017-05-16 09:05:392017-05-16 09:05:39Making Sense of WannaCry
I work from home. To some this seems like the ideal situation, and in many ways it is. My commute to the “office” takes 30 seconds, I never get caught up in traffic, there’s always good food, and I don’t have to worry about what I’m wearing. But there are many downsides to a home […]
https://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.png00Javvad Malikhttps://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.pngJavvad Malik2017-05-12 09:09:202017-05-12 09:09:20Looking busy when working from home
European startup CLTRe founded by Kai Roer has spent the last couple of years examining the security awareness and user behaviour problem through the lens of security culture. Based on findings over the course of 2016, CLTRe has produced its first annual Security Culture report, co-written by Roer and Gregor Petric, Ph.D., an Associate Professor […]
I’ve followed Scott Helme’s work for a while now and have been impressed with his approach. So was interested to find out that he had teamed up with BBC Click and Prof Alan Woodward to comprehensively dismantle a vendors claim to total security. Scott has published the whole story on his blog and The BBC Click […]
In between all the politics and memes on twitter, you sometimes come across a genuinely interesting security conversation. My friend Quentyn Taylor, who happens to be a CISO posted this tweet that generated a lot of great commentary. and for those infosec people who just say “upgrade all your legacy”…well someday you too may work […]
On 17 April (Monday) the strain, dubbed “BankBot”, was discovered in an application called “HappyTimes Videos” on Google’s Play Store. In addition, experts from Securify, a Dutch cybersecurity firm, recently found another infected app there, titled “Funny Videos 2017”. The Trojan is able to pose as legitimate services, mostly banks and financial institutions. However, once […]
The Intercontinental Hotels Group (IHG) has been forced to reveal yet another major data breach of customer card details over the latter part of 2016. In a lengthy missive on Friday, the group explained that an unspecified number of IHG hotels run as franchises were affected between September 29 and December 29 last year. via […]
Like Mirai, Hajime also scans the internet for poorly secured IoT devices like cameras, DVRs, and routers. It compromises them by trying different username and password combinations and then transferring a malicious program. However, Hajime doesn’t take orders from a command-and-control server like Mirai-infected devices do. Instead, it communicates over a peer-to-peer network built off protocols […]
A sharp spike in the number of health care data breaches was recorded in March with 39 incidents taking place compromising more than 1.5 million patient record. via 1.5 million records lost in March health care industry data breaches 1.5m records lost in March health care industry data breaches represents a rather unsettling trend. While […]
The ransomware is provided as a C++ source code, paired with the necessary PHP web server scripts and a payment panel. via CradleCore Ransomware Sold as Source Code | SecurityWeek.Com As if the world didn’t have enough troubles with vanilla ransomware. They went ahead and created ransomware as a service (RaaS). But now they’ve gone […]
“Customers should pay close attention (to) their own security and take security into consideration when selecting a service bureau and working with other third-party providers,” SWIFT, also known as the Society for Worldwide Interbank Financial Telecommunication, said in a press release published on its website. via SWIFT warns on vendor security after documents leaked by […]
Cyberattacks — “We had one of our top cyberattack experts at AP talk to us. They were unanimous that the word is greatly overused for things like hacking. We caution that the word cyberattack should be used only for significant and widespread destruction,” Froke said. via AP style for first time allows use of they as […]
https://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.png00Javvad Malikhttps://www.j4vv4d.com/wp-content/uploads/2016/06/logo_Javvad.pngJavvad Malik2017-04-18 19:08:232017-04-18 19:08:23Stop calling it a cyberattack!
What originally appeared to be one of the most damaging releases in recent memory of “zero-day” exploits, or hacking tools that take advantage of previously unknown software vulnerabilities, fell from the sky with the shrieking ferocity of a MOAB bomb and landed with the soft thud of a dud. via Microsoft’s Quiet Patch of Shadow […]