Proposed Legislation To Make IoT Devices More Secure

Digital Minister Margot James has proposed the introduction of legislation that could make internet-connected gadgets less vulnerable to attacks by hackers. What’s The Problem? Gartner predicts that there will be 14.2 billion ‘smart’, internet-connected devices in use worldwide by the end of 2019.  These devices include connected TVs, smart speakers and home appliances. In business […]

Continue reading


G7 Cyber Attack Simulation To Test Financial Sector

The G7 nations will be holding a simulated cyber-attack this month to test the possible effects of a serious malware infection on the financial sector. France The attack simulation was organised by the French central bank under France’s presidency of the Group of Seven nations (G7).  The three-day exercise will be aimed at demonstrating the […]

Continue reading


Microsoft’s Move Away From Passwords Towards Biometrics

In a recent interview with CBNC, Microsoft’s Corporate Vice President and Chief Information Officer Bret Arsenault signalled the corporation’s move away from passwords on their own as a means of authentication towards (biometrics) and a “passwordless future”. Passwords – Not Enough On Their Own Many of us are now used to two-factor authentication e.g. receiving […]

Continue reading


Surveillance Attack on WhatsApp

It has been reported that it was a surveillance attack on Facebook’s WhatsApp messaging app that caused the company to urge all of its 1.5bn users to update their apps as an extra precaution recently. What Kind of Attack? Technical commentators have identified the attack on WhatsApp as a ‘zero-day’ exploit that is used to […]

Continue reading


HTTPS Security Vulnerabilities Found

Research teams at Ca’ Foscari University of Venice and Tu Wien in Austria have discovered security vulnerabilities in the TLS browser encryption defence system of 5.5% of 10,000 HTTPS sites which could leave website visitors vulnerable to attack. What Is TLS? Transport Layer Security (TLS) is one of the two security protocols (the other is SSL) […]

Continue reading


Microsoft Tests ‘Sandbox’ Safe Browsing Extension For Chrome & Firefox

Microsoft is testing an in-browser ‘sandbox’ security extension for Chrome and Firefox that lets users access untrusted pages, safely. Windows Defender Application Guard The new browser extension, Windows Defender Application Guard, is already part of Microsoft’s Edge browser and will be rolled out as part of the next Windows 10 update ‘April 2019’ or 19H1 […]

Continue reading


Businesses Delayed Security Breach Disclosure

An FoI request to the Information Commissioner’s Office (ICO) has revealed cause for concern over whether businesses on the run up to the implementation of GDPR were preventing, detecting and responding to security threats and breaches in a good and compliant way. Delay In Identifying and Reporting An FoI request to the ICO by threat […]

Continue reading


Warning: Serious Windows 7 Bug Reported

Google has warned those who are still using Windows 7 that they are at risk of hackers being able to take over their computer by exploiting the combination of a flaw in the Window 7 OS and Google’s Chrome Browser. Google Alert The threat to Windows 7 comes from combined flaws in its OS, and […]

Continue reading


DNS infrastructure Under Attack

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a warning that the DNS infrastructure is facing an “ongoing and significant risk” and has urged domain owners to deploy DNSSEC technology. ICANN ICANN is one of the many organisations involved in the decentralised management of the Internet but is specifically responsible for coordinating […]

Continue reading


Form-Jacking Attacks Hit High Profile Companies

Research by Security Company Symantec has revealed that high profile companies such as BA and Ticketmaster are among the many thousands of businesses whose websites are being targeted with “form-jacking” attacks every month. What Is Form-Jacking? Form-jacking involves inserting a small amount of malicious JavaScript code into the checkout web pages of e-commerce sites, thereby […]

Continue reading