Home » Author Archive

My WordPress Site Has Been Hacked! Help!

Don’t Panic! Keep Calm, sort it out step-by-step. Recently our website was hacked and defaced. We should have been on alert as the Google Webmaster website sent us a message to update our WordPress site to the latest version, which is the first time they sent us a warning in all the years we have been registered with them. That alone should have been enough to get us to do something, but alas we had other things on the agenda, and didn’t get around to it. Bad move. We were hacked and most likely you were hacked by a script, an automated... 
 

Cyber Security 3.0

We are entering the third phase of Cyber Security. Phase one was all about perimeter security, read Firewall, and Anti-Virus, if you had those two security controls you were “secure”. In this phase your security team was the firewall guy/gal. Then we started to hear about big organisations getting hacked, Sony, Target and JP Morgan Chase were just a few of the big ones to hit the front pages of newspapers across the globe. The target CEO was a casualty of their hack, and board rooms started to take security seriously. Late phase one... 
 

Dell, The Worse IT Company I Have Dealt With!

I am an IT guy, like most IT guys I like my gadgets, I like my technology. Recently I have changed job roles, my new role requires (well requires is what I tell the Mrs) that I have a brand new VMWare ESX server, so I can run a decent test rig with a bunch of virtual machines. I need a load of RAM, the more the merrier, maybe an SDD drive for speed, and dual processors with multiple cores would be the way to go. So I thought I would buy a new server from the boys at Dell. What a mistake. I ordered the new rig on the 11th September from the Dell... 
 

Why Anti-Virus is so Useless

Times are a changing. Once a upon a time your security was all about a decent Firewall and some Anti-Virus and you were good to go. Yeah, not so much any more. Signature based Anti-Virus, as a tool to protect you from infection, is pretty much useless in this day and age. Why, because hackers and the techniques they use to infect you have evolved. Back in the day if you spotted a new bit Malware you could create a signature, essentially a SHA1, that would allow you to detect the Malware and allow you to block the infection. The challenge now-a-days... 
 

Reviewed : Kindle Fire HDX 7″ Tablet

The Kindle Fire HDX is a move away from the traditional Kindle, its a tablet rather than an e-reader. The resolution is 1920 x 1200, which is what you would typically get on a normal PC monitor and even better than a lot of the televisions out-there, AND its HD, High Definition, with a screen that will adjust depending on the amount of sunlight around, a feature ported from the original Kindle. The processor is a fast 2.2 GHz quad-core processor, which again is what you would find in a low end laptop, but it packs a small 2GB of RAM. Now-a-days... 
 

The Force is Strong

New Star-Wars trailer is out, and the movie looks like it is going to be a hit. Come on Christmas 2015!  Read More »
 

The Truth About Mobile Malware!

A Toxic Hell Stew of Vulnerabilities The above quote was made by Tim Cook at last years Apple developers conference in regards to the Android operating system. He went on to say that 99% of all Mobile Malware was produced for, and operated on Android. Having come from a threat research background I can tell you he is not to far wrong. But…. There are lies, damn lies and then, there are statistics. If you just limit your view to a portion of the statistics you could easily conclude the Android is indeed “a toxic hell stew of vulnerabilities”,... 
 

Owned! Your Computers Belong to Us.

Legbacore Presenation The boys Xeno Kovah and Corey Kallenberg, regulars at the major security conferences, gave a presentation at the CanSecWest security conference in Vancouver this past week, on how to hack BIOSes. Xeno and Corey, previously of MITRE (you know the non-profit organization that manages Federally Funded Research and Development Centers (FFRDCs) supporting the DOD, the FAA, the IRS, the DHS, and NIST) fame, have gone out on their own at LegbaCore. Their first major bit of research is a working proof of concept of owning BIOS Chips... 
 

Next Gen SOC to Protect Our Boys in the Field

Dr Kevin Jones & Ben Parish It has been announced today that Airbus Group Innovations has been awarded a major contract by the Defence Science and Technology Laboratory (DSTL), as part of their Cyber Situational Awareness research project. The project goal is to develop and mature a Virtual Cyber Centre of Operations (VCCO), that will allow military decision makers to call on experts anywhere around the world to help deal with cyber situations. The research will assist in the development and design of a next generation Security Operations... 
 

Best Books to Learn Malware Analysis & Intrusion Detection

I currently work for Trend Micro, one of the top three Anti-Virus vendors in the market. In fact in Japan we have something like 70% market share and are also by far the favourite AV product in Germany and Iceland. We fight with McAfee and Symantec for the top positions around the rest of the globe. My background has always been security, but previously it was Security Information and Event Management, known as SIEM, and Security Configuration Management, not so much Malware and Trojans. So, I had to get up to speed. I did do an internal course... 
 
© 2006-2017 Security Magazine.