Home » Cyber Security

Encrypted Portable Hard Disk

I have got a new toy, and its cool. An Encrypted Portal Hard-disk that can only be accessed if you know the pin, which you must type in to the number pad on the front of the drive. I have a new contract with a local government client, where I am creating a new database for at risk individuals. They take user data protection pretty seriously and required that all documents I took off premises is protected, that includes providing protection in the case of losing my laptop, USB Stick or portable drive. They, as well as all UK government organisations,... 
 

The Truth About Mobile Malware!

A Toxic Hell Stew of Vulnerabilities The above quote was made by Tim Cook at last years Apple developers conference in regards to the Android operating system. He went on to say that 99% of all Mobile Malware was produced for, and operated on Android. Having come from a threat research background I can tell you he is not to far wrong. But…. There are lies, damn lies and then, there are statistics. If you just limit your view to a portion of the statistics you could easily conclude the Android is indeed “a toxic hell stew of vulnerabilities”,... 
 

Next Gen SOC to Protect Our Boys in the Field

Dr Kevin Jones & Ben Parish It has been announced today that Airbus Group Innovations has been awarded a major contract by the Defence Science and Technology Laboratory (DSTL), as part of their Cyber Situational Awareness research project. The project goal is to develop and mature a Virtual Cyber Centre of Operations (VCCO), that will allow military decision makers to call on experts anywhere around the world to help deal with cyber situations. The research will assist in the development and design of a next generation Security Operations... 
 

What to Look For When Selecting Your SIEM Solution

In today’s diverse and sophisticated threat landscape, CISOs and IT departments face daunting information security challenges. When you start to secure your network and monitor the events occurring then SIEM solution comes in, but they are expensive and time consuming. While that may be true with enterprise SIEM products placed into environments that don’t have the capability to manage them, technology does exist for smaller security departments. So first let’s look at selecting a SIEM solution, when selecting a SIEM product you... 
 

Are You a Target for an APT (Advanced Persistent Threat)

In a previous article I explained what an APT looked like. Most organisations I talk to believe they are not likely to be a target of an APT, the logic being that they have nothing of interest that a foreign government would need. It is true certain organisations are more likely to be targeted by a foreign government, other government organisations for example, organisations that make up part of the critical national infrastructure, that would include most banks, oil and energy companies, broadcasters or power generating organisations, however... 
 

Advanced Persistent Threats (APT)

One of the big themes of InfoSec 2013 was APT’s. A number of talks specifically targeted (excuse the pun) this topic. The perception is that APT’s are state sponsored attacks, this perception is driven by the cost and resources required to implement this type of attack. The reality is however that if you have digital assets that are worth going after, you are at risk of this type of attacks. For those not in the specific anti-malware/anti-virus industry the definition of an Advanced Persistent Threat is not entirely clear. From... 
 

How Secure is Your Password?

There have been a lot of recent security breaches in cyber land, including LinkedIn, the FBI and more recently Yahoo. The Yahoo breach included over 400,000 usernames and passwords. While this is bad news for Yahoo, it does give us a chance to analysis the passwords from the 400,000 users and see what insights we can derive. Below is an analysis of the Yahoo passwords. The top ten passwords are a list of the usual suspects with “qwerty,”123456” and good old “password” all appearing again. It is good to see password... 
 

Top Free Internet Security Tools

Obviously the old adage, you get what you pay for is just as relevant on the Web as it is offline. However there are always exceptions to the rule, and software developed by the community, or by Enterprises that give you a free taste of their full version, hoping you will one day upgrade are an example of one of those exceptions. There are many commercial antivirus products out there, and most are worth paying for, our favorite is Trend Micro Titanium Large organisations do not usually install freeware or open source, as they struggle to get the... 
 

Barbarians at the Password Gate

Why you should be worried about your passwords We’re now using the Internet for a wide range of everyday activities, including online banking, stock trading, online shopping, bill paying, socializing, gaming, entertainment and online research. In the last few years there’s been a massive growth in the number of social networking sites such as Facebook, Linkedin, Twitter, Craigslist, Instagram, Tumblr. We share all kinds of personal details on these sites as well as music, pictures and videos, most of which we would certainly prefer... 
 

FBI’s MOST WANTED – Chinese Generals!

Sun Kailiang On the 1st May 2014 a United States grand jury in Pennsylvania indicted five Chinese military officials on 31 counts of cyber espionage. The five instantly jumped to the top of the FBI’s Cyber’s Most Wanted list and are all members of the People’s Liberation Army (PLA) of the People’s Republic of China (PRC). The indictment included: conspiring to commit computer fraud; accessing a computer without authorization for the purpose of commercial advantage and private financial gain; damaging computers through the... 
 
© 2006-2017 Security Magazine.