12 C
London
Saturday, September 23, 2017

Live demo of Android Penetration Testing at Infosecurity Europe 2014

Pen Test Partners are performing live penetration testing against Android devices. infosecurity 2014

Cryptolocker Ransomware: What You Need To Know

A new version of Cryptolocker—dubbed Cryptolocker 2.0—has been discovered by ESET, although researchers believe it to be a copycat of the original Cryptolocker after...

Lulzsec hacker group handed jail sentences

Lulzsec hacker group handed jail sentences LulzSec hacker Jake Davis: 'The internet is a world devoid of empathy' British hackers who were behind a series of...

At Infosecurity Europe 2014 in London

We are visiting the infosecurity Europe 2014 event at Earls Court in London. We will be providing updates on key aspects of the event.

NSA Data Centre: electrical surges caused by too much power use

This is embarrassingly funny.The WSJ reports that the NSA's new Utah data center has suffered 10 meltdowns in the past 13 months because of...

FBI Ransomware Now Targeting Apple’s Mac OS X Users

Note: this is a JavaScript attack which works on Apple Mac / OS X, this is not an Apple Mac Trojan (binary). For years, Windows...

What is an Advanced Persistent Threat (APT)

Advanced persistent threat (APT) is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering...

ShapeShifter: Advanced Website Defense

An inherent issue: the web was designed to be open, not secure HTML is, by its very nature, publicly readable code, which makes it easy...

Six Simple Steps to Enterprise Risk Management

Enterprise risk management is a scalable, holistic approach to improved decision-making that consolidates and organizes risk information from across an organization. No longer limited to a risk manager’s monthly report, ERM is becoming a fundamental part of business success.

By embracing ERM and creating a risk management culture, organizations can drive business performance, innovation and growth, while protecting company reputation and shareholder value. For many businesses, demonstrating that they have a clear, auditable risk management process has become a critical factor in winning new business. Unfortunately, too many business leaders still perceive risk management as a complex undertaking.
In reality, there are six simple steps to follow for effective risk management, – regardless of the industry, vertical, size or scope of the project or company.

U.N. warns on mobile cybersecurity bugs in bid to prevent attacks

A United Nations group that advises nations on cybersecurity plans to send out an alert about significant vulnerabilities in mobile phone technology that could...