At the recent East Midlands Cyber Security Forum (EMCSF), I was fortunate enough to have the opportunity to chair a panel session on the topic of ransomware. Continue reading “3 key ways to stop ransomware”
Tag: Malicious Software
How can firms protect themselves from ransomware?
In a previous blog post I wrote about the rise of ransomware over the last year. In this post I will briefly outline what steps organisations should take to avoid becoming the next victim of ransomware. Continue reading “How can firms protect themselves from ransomware?”
Top cyber crime threats to East Midlands businesses
I recently attended the East Midlands Cyber Crime Breakfast, where a panel of experts outlined what they saw as the principal cyber crime threats that were affecting organisations in the East Midlands. Continue reading “Top cyber crime threats to East Midlands businesses”
What is ransomware?
Computer hacking has evolved considerably over the past 20 years. What was once a “hobby” to demonstrate technical prowess, by breaking into systems and putting graffiti on web sites, then evolved into stealing as a way of gaining criminal financial reward. Continue reading “What is ransomware?”
Is your browser in the Goldilocks zone?
If your web browser is too old, you will not be able to access sites using strong security.
If your web browser is too new, it will prevent you accessing sites with weaker security.
So most corporates will need to make sure their browsers are just right – the Goldilocks zone – not too weak, but not too secure. Continue reading “Is your browser in the Goldilocks zone?”
Trustworthy Wallets
Bitcoin is a subject that Cyber Matters first reported on two years ago, concluding it was premature to invest, unless you can afford to lose your stake. Since that time, the underlying Blockchain has been gaining an increase in interest. Continue reading “Trustworthy Wallets”
Another week, another IoT security scare!
With the recent events and stories hitting the news, such as CES 2016 announcing plenty of new IoT products and new toys being hackable, no wonder I couldn’t miss the opportunity to talk about them – the first thing to catch my eye this week was ……
Continue reading “Another week, another IoT security scare!”
Could PAS 754 have helped Juniper?
In an important Juniper security announcement last month it was revealed that:
“During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen® devices and to decrypt VPN connections.” Continue reading “Could PAS 754 have helped Juniper?”
Is your New Toy Hackable?
Over the last few days, many children will have received gifts of the latest interconnected toys. Sadly as a security community we know many of these will be insecure. Continue reading “Is your New Toy Hackable?”
Firestorm – how to avoid the latest Next Generation Firewall vulnerability
A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading “Firestorm – how to avoid the latest Next Generation Firewall vulnerability”