Top 5 Predictions For ICS Security In 2018

Critical Gaps in Leading Secure Web Gateways

Nozomi Networks, a company that provides real-time cybersecurity and operational visibility into Industrial Control Networks has comprised the top 5 predictions for ICS Security in 2018 Edgard Capdevielle, CEO at Nozomi Networks outlines the 5: Edgard Capdevielle, CEO at Nozomi Networks: 1. ICS Malware Moves Beyond Windows Exploits to ICS-Specific Malware. Up to now, most […]

Webroot Security Predictions 2018


Ransomware / Malware Backups will not prove enough to stop ransomware as hackers find ways to subvert this strategy.  –  George Anderson, director of product marketing, Webroot Malware campaigns will use AI to make secondary infection decisions based on learning from previous campaigns.  –  Gary Hayslip, chief information security officer, Webroot Will see the first prolific script-based […]

NSA Leaker Still Possibly Working At Agency

The former CIA director Michael Morell has admitted that the leaker involved in the NSA Shadow Brokers leak might still be at work in the agency as, 15 months after the leak first occurred, they are still uncertain of what was stolen and whether there is more to come. Piers Wilson, Head of Product Management […]

‘Highly Secure’ Cloud Tool, Huddle, Exposes Private KPMG + BBC Files

European Cloud28+ initiative

Following the news that security flaw has been detected in office collaboration tool Huddle which has led to private documents being exposed to unauthorised parties. Huddle has confirmed instances of a corporate user logging on only to be re-directed to another company’s account. This is particularly concerning given that Huddle software is used by the […]

The New iPhone Facial Recognition Feature Has Already Been Beaten By Security Researchers

iOS Malware

News broke yesterday that a cybersecurity company based in Singapore has already ‘beaten’ the latest facial recognition feature unveiled by Apple for their latest model, the iPhone X. Bkav says a 3D-printed mask costing just $150 (£115) to make has fooled the Face ID software, which is used to unlock the iPhone X, authorise payments and log in […]

UK Police ‘Lacking Transparecy’ Over Data Seized

ONS Crime Statistics

Yesterday, Big Brother Watch (BBW) published the ‘Police Access to Digital Evidence’ report which revealed 93% of UK police forces now extract data from seized devices. The report said: “Laws in this field remain murky, and rather than updating the existing laws to adequately address the complexities of new technology and data, the government has merely […]

GDPR – Know The Seven Key Principles

When it comes to expectations around the necessity for securing and protecting customer data, the EU General Data Protection Regulation (GDPR) is very clear. What isn’t quite as clear is exactly how organizations should go about securing their data. We don’t know what to expect when it comes to GDPR enforcement, and some regulations are […]

6 Steps For Proactive Cyberthreat Response

The distributed approach to cybercrime has forever changed the threat landscape. It was erected around a business model of maximising ROI — reusing tried–and–true attack methods rather than organically developing new ones, targeting as many victims as possible and automating the attack workflow. The WannaCry attack of 2017 is the perfect example of this approach […]

IcedID,, The New Banking Trojan To Watch Out For

News broke overnight of a new banking trojan, discovered by security experts and christened IcedID. The trojan appears to still be in its development stages, but has been reportedly targeting financial institutions in the United States and Canada, as well as two in the UK. IT security experts are commented below. Andy Norton, Director of Threat Intelligence at Lastline:  […]