Home » Author Archive

Bitcoin Plunges 29% in Two Days!

Bitcoin peaked at $2779 on Thursday, in less than two days it hit a low of $1973, thats a loss for “investors” (read gamblers) of over 29%. If a real currency was to plunge 29% in two days people would assume the country that issued the currency was going bankrupt, or had just been invaded by a Trump lead army, or some other massive upheaval. But thats the point Bitcoin is not a real currency, issued and backed up by a country’s government and revenue (read taxes), or backed up by some other intrinsic value, like directly linked... 
 

Global Hack Attack Only Makes $16k, It Makes You WannaCry!

Yesterday’s global WannaCry Ransomware attack made it’s authors a grand total of $16800, a total of 46 victims paying up the required $300 for unencrypting their data. Transactions can be monitored via the Bitcoin accounts that hackers wanted payments sent to. There were three bitcoin accounts associated with the hack: https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw https://blockchain.info/address/13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 https://blockchain.info/address/115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn The attack was... 
 

Best Laptops For Cyber Security Students in 2017

Having taught a number of Cyber Security classes in the past year I often get asked what equipment cyber security students need to be successful. Fortunately there is a simple answer, you need Internet access, and a decent laptop. You are not going to get very far as a student with out the Internet, especially when learning about cutting edge technology or techniques in cyber security. Laptop’s however are slightly more complicated, there are many different types of laptops, with different configurations, different RAM, CPU hard disks etc... 
 

Yahoo Loses 500 Million, MILLION User Account Details!

Bob Lord, CISO over at Yahoo has confirmed the company was hacked and the perpetrators got away with account information for half a billion users. From what is likely to be one of the largest hacks of all time Bob’s statement casually drops in the following “investigation has found no evidence that the state-sponsored actor is currently in Yahoo’s network” That’s right according to Bob, they were attacked by a NATION STATE! No if’s no but’s, the state-sponsored actor is no longer in their network. It is unusual... 
 

Setup Twitch Streaming in Ten Minutes!

So you want to stream? Well you are not alone, tonnes of people are getting in on the game and loving every moment on it. To stream you are going to need sort out some stuff, some hardware (computer, microphone and webcam as a basic), an internet connection (maybe better than the one you are on now) and some software (actually the easiest part). In this article we will cover everything you need to know and do to get you up an streaming, in less than ten minutes if you have sorted out the basics. Let’s start with those basics. You need an... 
 

The World’s Hottest Cyber Security Startup Valuation at $3.5Billion

There is no doubt that Cyber Security is a hot button issue. Major companies across the globe have announced breaches in the past couple of years, including Sony (USD$76 Billion Revenue), JP Morgan Chase (USD$25 Billion Revenue) and Home Depot (USD$80 Billion Revenue). If these large organisations with their, likely, huge IT Operation and Security budgets cannot stop the bad guys from breaching their networks what chances does the average organisation have of stopping them? The answer is, you can’t stop them, they are going to get in, or... 
 

The Problem with SIEM

I am a big fan of Security Information Event Management (SIEM), I mean if you don’t know what is actually happening in your environment you certainly can’t claim to be secure. Your SIEM solution will see new users created in Active Directory, it will see new software installed, it will see a login in to your network from a foreign IP address, but here is the problem. As the attacks from external sources become more sophisticated it become harder to understand what to look for within the audit logs. What does a breach look like? What... 
 

Dubai, The Monitoring State

Interestingly I found myself in Dubai this past week, attending the GISEC security conference, one of the big tech conferences in the region. Now I am a fan of Dubai, the weather is warm, well bloody hot if I am honest, the hotels are the best on the planet for the money, and I always feel safe wandering around Dubai, even if I am wandering around at 3:00am because my body clock is still on UK time. But here’s the thing, I went to check in to my hotel on Sheikh Zayed Al Nahyan Road, walking distance of Dubai World Trade Centre, where all... 
 

Elon Musk Announces “THE MISSING PIECE”

Elon Musk in Hawthorne California, today announced “Tesla Energy” and it’s new product, a battery, stating that current batteries “suck, they are stinky and ugly, you need the missing piece, that will allow you to have a sustainable world, that missing piece is what we are going to show you tonight.” Elon Stated “we have this handy fusion reactor in the sky, the Sun”, generating enough power to provide for all of humankinds current and future energy needs, “the Sun, it just works, show’s up... 
 

Cool Tech : An Ink-less Printer

You can now turn your mobile phone in to the 80’s favorite, an instant Polaroid Camera. From the makers of the, well the, Polaroid Camera comes the Polaroid Printer! It allows you to take any photo from your mobile phone and instantly print it to the Polaroid Zip Mobile Printer. They provide an App, avliable on Android and iOS, that allows you to take virtually any image and instantly print 2×3 inch color photos. The App has a bunch of filters, effects and controls, think Instagram, to allow you to apply your creative genius before... 
 
© 2006-2017 Security Magazine.