Adware Behaving Like Malware

Two Canadian Researchers from Concordia University in Montreal report that adware behaves like malware and should be classified as such. In a research paper*, the two reviewed Wajam, a software that injects ads into browser traffic and found that it uses techniques employed by malware for browser process injection attacks.    Expert Comments:   Mike Bittner, Associate Director […]

Cloud Security Alliance Study Identifies New And Unique Security Challenges In Native Cloud, Hybrid And Multi-cloud Environments

Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and AlgoSec, the leading provider of business-driven network and cloud security management […]

Another WannaCry May Be Coming – Are You Ready?

The vulnerability is severe enough that Microsoft took a pretty unusual step in releasing updates for Windows XP and Server 2003 in addition to currently supported versions of Windows that are affected.    Unlike WannaCry, this threat is seen as extremely easy to exploit. It took a leaked NSA tool to exploit the WannaCry vulnerability, whereas the fear […]

Car Manufacturers Be Aware – Bluetooth Module Could Lead To Vehicle Shut Down By Hackers

According to new research uncovered by security specialists, Pen Test Partners, who were investigating the systems within Tesla vehicles, found that if hackers could attach an ELM327 Bluetooth module to the interface, they would have the ability to analyse the traffic and read CAN messages. If left in, a hacker could also potentially shut the car down.  Experts Comments:  Martin Jartelius, […]

Google Restricts Huawei’s Access To Android Operating System

It has been reported that Google has suspended Huawei’s access to updates of its Android operating system and chipmakers have reportedly cut off supplies to the Chinese telecoms company, complying with orders from the US government as it seeks to blacklist Huawei around the world. According to the story, Chipmakers such as Intel, Qualcomm, Xilinx, […]

Instagram – Unsecured Database Exposed

Instagram Rolls out two-factor Authentication

A massive database containing contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The database, hosted by Amazon Web Services, was left exposed and without a password allowing anyone to look inside. At the time of writing, the database had over 49 million records — but was growing by the hour. […]

Blockchain Systems: Known Attack Vectors And Countermeasures

There is no bulletproof digital network, and blockchain doesn’t stand out from the rest in this regard. However, the attacks targeting distributed ledgers differ from the ones used to compromise conventional computer networks. These exploitation scenarios rely on tampering with the process of achieving consensus to alter the data added to the ledger. 51% attack […]

Not Another GDPR Comment

Experts Comments:   Joseph Carson, Chief Security Scientist & Advisory CISO at Thycotic: The EU GDPR has been positive for the Information Security industry as it has forced many companies to re-evaluate their cybersecurity posture and better understand the type of personal information they have been collecting on EU citizens.    It means that companies who are regulated […]

GDPR: The Best Strategy For International Businesses

The EU’s General Data Protection Regulation (GDPR) was created with the aim of homogenising data privacy laws across the EU. GDPR also applies to organisations outside the EU, if they monitor EU data subjects, or offer goods and services to them. The GDPR applies to personal data, which is defined as any information relating to […]