The continuing Covid-19 house clearout led to me finding a pile of business cards… The first card, from 1990. An X.400 email address, did anyone every think that would really catch on? Looks like we ran our own PRMD, unusual for a small business. I wonder why our current meeting room is called the Enterprise? … Continue reading Covid-19 Clearout: Business Cards →
This month marks 20 years since the ILOVEYOU virus hit computer networks. For me, it represented a milestone in my security career. Up until that point security was a technical challenge, solving challenges associate with the global distribution of public keys for secure email exchange. (Aside, I’ve blogged on this many times, it is a … Continue reading ILOVEYOU – 20 Years On →
Reblog. Original (TechUK) 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. More…
Lockdown 2020 – I took the opportunity to learn Python. Wow, developers of today have it so easy!
The COVID-19 app is being trailed in the Isle of Wight, and has already created lots of public debate. The debate centres around security and privacy. However, there is part of security that has so far not been aired – false positives. Before I discuss false positives, I want to spend a few paragraphs on … Continue reading Security, Privacy and False Positives in the Covid-19 App →
Reblog. Original (Nexor.com) When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of… More…
Reblog. Original (TechUK) By now, we must all be aware that Cyber Security is a prominent issue – we recently heard mainstream news reports about Ransomware hitting the NHS and often hear about the latest data theft of millions of passwords or credit cards.…Home users should be starting to get the message about keeping our … Continue reading Reblog: How Do You Remain Savvy With Your Supply Chain →
Reblog: (original Nexor.com) On Wednesday 2nd October, the IISP East Midlands ran its third quarterly meeting kindly hosted by the East Midlands Special Operations Unit (EMSOU). Over 20 security professionals joined to collaborate and explore the latest news surrounding the incident response cycle, covering both what has worked well and learning points from real life … Continue reading IISP East Midlands →
CyberMatters started almost 5 years ago, as a proof of concept blog platform for Nexor. Over that time, we’ve covered a wide range of topics from general security advice on passwords, commentary on topics of the day, and discussion of the latest technology concepts Nexor has been working on. Over the last few months I’ve … Continue reading The last post: CyberMatters comes to an end →
The poor and inaccurate reporting of the NHS Ransomware incident over the weekend has irked CyberMatters into coming out of hibernation. With so much to say, it’s hard to know where to start. Not targeted First the NHS was not targeted by a Cyber Attack. The attack affected ANY system that was vulnerable; the sad … Continue reading The “NHS” Attack →
PKI is a technology that has stood the test of time, but it is let down by high running costs and poor implementation.
Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity. Li-FI has some very interesting security characteristics too.
Having been on a customer site all day, I returned home to scan my email. Over half the emails were festive greetings, with all sorts of creative content: embedded images, attached animated images, links to sites with festive messages and attached files with seasonal offers. What could possibly go wrong?
As we approach the Christmas holiday period, I thought I’d share a cautionary tale on setting up your Out-of-Office auto-response. For quite a while now I have been building a relationship with a prospective customer. While I have had discussions with a person there – let’s call him Bob – Bob has worked hard to … Continue reading Out of Office Dilemma →
So, Tesco was hacked. Although there is no official word yet on how this happened, the chatter among people far smarter than me are suggesting the issue is related to passwords and the Tesco Club card. Followers of CyberMatters will recognise that I often blog about password issues. Is there anything new to say on … Continue reading Payment Services Directive →
CyberMatters is a blog about security. This article is NOT about security, there is a related security point related to this article documented in the blog Smart Home Project – Network Segregation
Over the last few weekends I’ve rebuilt my smart home solution. It reminded me of how hard it is to build something that is secure.
In the blog S/MIME on Trial in 2013, I outlined some challenges using S/MIME to send secure email. I also posed the question, was I confident the issues would be solved in a 3-5 year timeframe? Well, here we are 3 years later, let’s take a look.
Something went wrong. Please refresh the page and/or try again.