Australia’s New Data Encryption Law

Following the news that Australia passed a hotly-debated national encryption law, IT security experts commented below. Colin Bastable, CEO at Lucy Security: “The issue is back doors and exploits – if governments can use them lawfully, cyber criminals can use them unlawfully. EternalBlue, for example, was gifted to cybercriminals by a leak from the NSA. Australia is opening […]

New Attack Could Make Website Security Captchas Obsolete

It has been reported that researchers have created new artificial intelligence that could spell the end for one of the most widely used website security systems. The new algorithm, based on deep learning methods, is the most effective solver of captcha security and authentication systems to date and is able to defeat versions of text captcha schemes used […]

Kubernetes Vulnerability Hits Top Of Severity Scale

It has been reported that Kubernetes vulnerability hits top of severity scale. The security issue strikes at some of the basic reasons for the rising popularity of containers as an architecture and Kubernetes as an orchestration mechanism.The vulnerability (CVE-2018-1002105) allows for privilege escalation and can be accessed by both authorised and unauthorised users. Gavin Millard, VP of Intelligence at Tenable explains […]

The Budget Should Help Us Bridge The Cyber Security Skills Gap

The media headlines were about the end of austerity and the digital sales tax on Google and Amazon. Yet from the viewpoint of a technology innovator it was the Chancellor of the Exchequer’s emphasis on investment in tech talent and cyber security that stood out in this year’s Budget. While an additional £1bn was announced […]

DanaBot Trojan Expands Attacks

The DanaBot banking trojan is back, and has expanded beyond banking to compromise Web-based email servers. Will LaSala, Director ,Security Solutions and Security Evangelist at OneSpan: “Previously the DanaBot focused on mainly harvesting banking credentials by a similar means to the new threat, essentially by compromising the Bank’s Web Portal.  It would steal usernames and passwords.  The […]