BYODs Linked To Security Incidents

A study by SME card payment services firm Paymentsense has shown a positive correlation between bring your own device (BYOD) schemes and increased cyber security risk in SMEs. BYOD Bring your own device (BYOD) schemes / policies have now become commonplace in many businesses, with the BYOD and enterprise mobility market size growing from USD […]

Continue reading


GDPR: Don’t Get Caught Out By Your Logfiles

With all the focus on the more visible elements of GDPR compliance ahead of the Regulation’s introduction of May 25th, one EU Working group is warning businesses not to forget what’s stored in the logfiles of their Internet-facing servers. What Are Logfiles and Why Should We Care? Logfiles record either events that occur in an […]

Continue reading


Half of UK Manufacturers Hit By Cyber Attacks

A new report published by manufacturers’ organisation EEF in partnership with insurance firm AIG and the Royal United Services Institute (RUSI) shows that 48% of UK manufacturers have been subject to a cyber-security incident at some time. Loss and Disruption Half of those manufacturing companies who admit to being hit by cyber-criminals have said that […]

Continue reading


Russia Suspected of Hacking Campaign

The UK’s National Cyber Security Centre (NCSC), the FBI and the US Department of Homeland Security have warned that Russia may be behind a broad hacking offensive targeting millions of machines that direct data around the net. Networking Equipment Targeted US and UK security agencies have issued a joint internet security alert warning and have […]

Continue reading


UK Launched Major Cyber Attack Against ISIS

GCHQ’s new director has revealed that last year, the UK has conducted a large-scale cyber-attack against ISIS that was designed to suppress online terrorist propaganda and hinder ISIS’s ability to coordinate attacks. Growing For A Decade Confirmation that the attack took place came as part of the first public speech by GCHQ’s new director and […]

Continue reading


Phishing Attack Simulator: Microsoft Goodies

Microsoft has announced a set of business security tools, including a phishing attack simulator, that make it easier and more affordable for businesses to identify and fix vulnerabilities before they become an issue. Attack Simulator One of the key tools announced to coincide with the annual RSA conference in San Francisco, is the Attack Simulator. […]

Continue reading


New MacOS Backdoor Linked to OceanLotus Found – TrendLabs Security Intelligence Blog

Trend micro recently discovered a backdoor in Mac OSX. The MacOS backdoor was found in a malicious Word document presumably distributed via email. The document bears the filename “2018-PHIẾU GHI DANH THAM DỰ TĨNH HỘI HMDC 2018.doc,” which translates to “2018-REGISTRATION FORM OF HMDC ASSEMBLY 2018.doc.” The document claims to be a registration form for […]

Continue reading


1 In 10 Fooled By Social Engineering Attacks

A new report by security firm Positive Technologies shows that 1 in 10 employees would fall for a social engineering attack. What Is A Social Engineering Attack? Social engineering cyber-attacks rely upon the element of human error e.g. convincing / fooling a person into downloading malicious files, unwittingly corresponding with cyber-criminals, sharing contact information about […]

Continue reading


£870 Million Super-Cyber-Crook Captured

The suspected leader of the criminal gang behind the Cobalt and Carbanak malware campaigns that targeted banks and netted £870 Million has been arrested in Spain. The Carbanak & Cobalt Malware Attacks Cobalt and Carbanak are names of the different generations of malware, increasing in sophistication – 3 were used in all – which the […]

Continue reading


Camelot Hack – ‘It Could be You!’

Lottery operator Camelot has announced that 150 customer accounts have been affected by a hack that took place prior to Friday’s £14-million draw at 8.30pm. Low Level The company has described the hack as ‘low level’ and has stressed that no money was stolen, and that the attackers only saw limited information. Camelot attributed the […]

Continue reading