Industrial Hacking

I don't normally comment on specific new stories, but this one was of particular interest. Earlier this year an Israeli intelligence expert named Tal Dilian (co-founder of Circles Technologies – a surveillance firm) showed off his van with surveillance equipment worth $9 million in Cyprus. The claim was that the equipment in this van could... Continue Reading →

New Feature – e-Books

This is not one of our typical blogs. We are announcing a new feature on our website today. We intend to compile and publish a number of e-books providing guidance on a number of topics in Cyber Security and Privacy. At this point this is a proof of concept (POC) to see if this approach... Continue Reading →

Open Redirects & Malware Installers

This week I noticed a report on how malware could be downloaded and installed using an Open Redirect from Cisco. Lets first define what an Open Redirect is. An open redirect is when a legitimate site allows unauthorized users to create URLs on that site to redirect visitors to other sites. For example, Google has... Continue Reading →

Myths of Cyber Security

I have found there is a general perception among people that they won't be hit by a cyber attack of some form and that cyber security is not something they need to worry about too much, after all you have installed an Internet Security product on your PC and you download apps from the official... Continue Reading →

Domain Typo Squatting

I would like you to take a look at the following web address: What do you see? Do you see microsoft.com? You would be very wrong if you did. Zoom in on the above picture. This address is actually RNICROSOFT.COM and not the address you first thought of. UNDER NO CIRCUMSTANCES GO TO ANY ON... Continue Reading →

Create a website or blog at WordPress.com

Up ↑