March 21, 2019 - A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
March 1, 2019 - A recently released paper by Google has resurrected the spirit of Spectre, a seemingly never-ending threat to most makes of processor. We take a look at what this means, and what the Universal Read Gadget means for most technology users.
February 14, 2019 - A hacker managed to compromise, and entirely destroy, a popular email service and all of its backups. What happened?
January 16, 2019 - While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.
January 11, 2019 - Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?
December 26, 2018 - In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
October 23, 2018 - What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?
October 10, 2018 - A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.
October 4, 2018 - Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines.
September 28, 2018 - Magecart and other criminal groups are causing mayhem by stealing payment information from e-commerce sites, big and small. Learn how they are doing it and how to mitigate against it.