2018

Security risk through USB cable attacks
USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily...

If future IIoT security lies at the Edge, then so do VPNs
It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

Software Holds the Key to Connected Car Security
Software is fast becoming the most important component of the modern car. Already, digital engineering advances that enhance attributes like fuel efficiency, engine management and in-car entertainment...

IT Security Costs Money, no IT Security Costs More Money
British Airways, or rather its customers, are the latest victims of a major hack that compromised sensitive personal data. Details of 380,000 credit cards are claimed to have been stolen in the data...

The Cloud Presents New Risks for Financial Services
The world’s major financial institutions know the winds of change are here. They are well aware that if they stick to traditional banking methods underpinned by decades-old technology they will be...

Friend or Foe: The Importance of Multi-Factor Authentication
The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

Tiny loopholes that can wreak havoc
Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

Easing Hospitals' Mobile Data Security Worries
Mobile communications devices are transforming healthcare services worldwide. Whether helping front line staff to share electronic medical records (EMR), deliver more timely diagnoses through remote...

Naivety, absurdity or just plain and understandable frustration? Why do we not learn from our mistakes in cybersecurity?
More than half of all users active on the Internet (55%) have been affected by fraud, according to a study by FICO. But this has by no means led to better security precautions and increased awareness....

ISPs make a play for control of data privacy
Forget Facebook, forget Google, forget Amazon – privacy defenders they most certainly are not, but their transgressions may prove to be nothing compared to the privacy threat currently posed by the...