Protect Your Customers With Crypto Wallets Security Testing

Protect Your Customers With Crypto Wallets Security Testing

Crypto wallets with their valuable contents are an attractive target for cyber criminals. Cyber attackers look for any opportunity to breach both hot and cold crypto wallets, and wallet users rely on their wallet providers to keep their crypto currency safe. As a result, crypto wallets implement information security controls to keep them safe, from…

Read more
Can Bug Bounty Programmes Replace Pen Testing?

Can Bug Bounty Programmes Replace Pen Testing?

Security vulnerabilities are a real problem for software developers everywhere, and the organisations that employ them. Many issues are annoying but harmless, but the worst vulnerabilities in a piece of software could compromise security, and cause it to be vulnerable to a breach, which if realised, could cause untold damage to the organisation. The traditional…

Read more
A Cyber Attack Isn’t Over Until the Post Event Analysis Says So

A Cyber Attack Isn’t Over Until the Post Event Analysis Says So

To borrow a phrase from Oscar Wilde, to fall victim to a ransomware attack once may be regarded as a misfortune. To fall victim to a ransomware attack twice looks like carelessness. And yet, that is exactly what happened to an organisation just this month. They paid the ransom, received the decryption key, restored systems,…

Read more
Smishing Text Messages Bring Cyber Attacks to Phones

The New Frontier: Smishing Text Messages Bring Cyber Attacks to Phones

You know all about phishing scams via email, and you are careful to never click on a link you don’t recognise. But how careful are you when it comes to messages on your phone? Are you confident that the SMS from the bank, or the link sent to you via WhatsApp from your friend is…

Read more
Cyber Security Trends 2021 After The Perfect Storm Of 2020

Cyber Security Trends 2021 After The Perfect Storm Of 2020

2020 has been described by some as the ‘Cybercrime Peak’. While it is undeniable that cyber crime increased dramatically in 2020, based on current form, the cyber security trends for 2021 look to be heading the same way. 2020 saw some old cyber security trends increase in popularity (did anyone say ransomware?), and some new…

Read more
Up Your Email Security Game With DMARC Email Authentication

Up Your Email Security Game With DMARC Email Authentication

The battle against phishing, spam, and malicious emails is never ending. 3.1 billion domain spoofing emails are sent every single day, forcing email provider filters to work extra hard to filter out malicious emails and prevent them from reaching inboxes. In this ongoing, multifaceted battle, DMARC email authentication is one way that every organisation can…

Read more
You’re going for ISO 27001 certification. Now what?

You’re going for ISO 27001 certification. Now what?

Information security is important to everyone. Many of your current and future clients may add ISO 27001 certification as a condition of doing business with you, putting you in a position where you need to start assessing your policies, processes, and procedures. While ISO 27001 alone won’t guarantee you have effective information security practices in…

Read more
Emotet Malware is a Gift That Keeps on Giving

Emotet Malware is a Gift That Keeps on Giving

Not all malware are created equally. And of all the malware out there, the Emotet malware is one of the most potent. Throughout its long life, Emotet has been linked to major malware attacks, and has consistently topped the Global Threat Index since September 2020. The only exception was a relatively quiet November, during which…

Read more
New WhatsApp Privacy Policy Announces Facebook Data Sharing

New WhatsApp Privacy Policy Publicly Acknowledges Facebook Data Sharing

The new WhatsApp privacy policy released this week raised several key questions for data protection experts everywhere (and everyone else really). The new privacy policy sets out the information that WhatsApp shares with Facebook, and makes it clear that this policy is non-negotiable – if you don’t like WhatsApp sharing your data with Facebook, your…

Read more
Data Breach Brokers - Avoid Data Falling Into the Wrong Hands

Data Breach Brokers – Avoid Data Falling Into the Wrong Hands

What happens after a data breach?  Discovery of a data breach is only the tip of the iceberg. Even as companies complete their initial incident response and begin their recovery, trying to minimise the leak and reduce the damage, the chances are that the stolen data has already been passed onto the next stage of…

Read more
What Cellebrite's Signal Hack Claims Teach Us About Cybersecurity

What Cellebrite’s Signal Hack Claims Teach Us About Cybersecurity

You may have seen the interesting tale of Cellebrite’s Signal hack claims that they cracked Signal’s at rest encryption, giving them access to encrypted messages on the app when they are physically on the device. This claim was quickly ridiculed, Cellebrite had to roll back their blog giving away their secrets, and Signal’s creator, Moxie…

Read more
Under Attack: The Cyber Attacks 2020 Landscape

Under Attack: The Cyber Attacks 2020 Landscape

2020 has been a busy year for cybersecurity around the world with hacks, ransomware attacks, and data breaches making the news on a regular basis. According to analysts there were double the number of cyber attacks in 2020 than in 2019. Some of this increase follows trends from previous years, but it also appears as…

Read more