Davey Winder

Ke3chang APT group drops Okrum backdoor bomb on diplomatic targets

Ke3chang APT group drops Okrum backdoor bomb on diplomatic targets

New versions of malware families linked to the Ke3chang APT group that operates out of China is being used to target political figures in Eastern Europe and the Americas

Can the DoRIoT project secure the Internet of Things?

Can the DoRIoT project secure the Internet of Things?

The way to secure the Internet of Things is to allow the self-organising migration of services away from a central cloud alone and into local infrastructure ecosystems where they can act independently. Or is it?

People increasingly trust machines more than humans to manage cyber-security

People increasingly trust machines more than humans to manage cyber-security

More than a quarter of 10,000 respondents to a global survey said they would rather have their cyber-security managed by artificial intelligence than human operatives - but didn't understand how AI works.

Research reveals enterprise security leaders are suffering from attack surface blindness

Research reveals enterprise security leaders are suffering from attack surface blindness

'Attack surface blindness' is holding back better enterprise cyber-security posture. 89% of security leaders struggle with visibility and insight into trusted data: IoT devices (20%) applications (18%) privileges (15.5%)

A devastating exploit using 'ticking-bomb' BlueKeep is "only weeks away"

A devastating exploit using 'ticking-bomb' BlueKeep is "only weeks away"

BlueKeep vulnerability could prove more serious than EternalBlue, the vulnerability that was exploited by the WannaCry attacks, and an attack exploiting BlueKeep is now only weeks away say some experts.

InfoSecurity 2019: Majority of exhibitors unprotected against email fraud

InfoSecurity 2019: Majority of exhibitors unprotected against email fraud

Of the 401 exhibitors at Infosecurity Europe 2019, it is believed that just 13 percent had actually executed full DMARC protection successfully so as to stop potential phishing emails at the gateway.

Your starter for ten: Why aren't Universities winning the cyber-security challenge?

Your starter for ten: Why aren't Universities winning the cyber-security challenge?

A quarter of UK universities believe their research programmes may have been infiltrated, and more than half confirm that a cyber-attack has led to research data ending up in foreign hands.

Data encryption in the enterprise surges as GDPR crosses first year

Data encryption in the enterprise surges as GDPR crosses first year

Survey: close to 66% of organisations now hardware encrypt their data compared with half last year, but 27 % equated a lack of encryption as being a main cause of a data breach at their organisation

ID: Has Microsoft just jumped the blockchain shark?

ID: Has Microsoft just jumped the blockchain shark?

Microsoft's new decentralised identity (DID) network called ION (Identity Overlay Network) runs over the top of the Bitcoin blockchain and achieves throughput of tens-of-thousands of operations per second

Cisco firewalls, routers and switches compromised by Thrangrycat - just don't call it a backdoor...

Cisco firewalls, routers and switches compromised by Thrangrycat - just don't call it a backdoor...

Thrangrycat can be "exploited remotely without any need for physical access" and as they reside in hardware design it's "unlikely that any software security patch will fully resolve the security vulnerability.