Tag Archives: Malicious Software

3 key ways to stop ransomware

1 Nov

At the recent East Midlands Cyber Security Forum (EMCSF), I was fortunate enough to have the opportunity to chair a panel session on the topic of ransomware. Continue reading

How can firms protect themselves from ransomware?

5 Oct

In a previous blog post I wrote about the rise of ransomware over the last year. In this post I will briefly outline what steps organisations should take to avoid becoming the next victim of ransomware. Continue reading

Top cyber crime threats to East Midlands businesses

20 Sep

I recently attended the East Midlands Cyber Crime Breakfast, where a panel of experts outlined what they saw as the principal cyber crime threats that were affecting organisations in the East Midlands. Continue reading

What is ransomware?

17 Aug

Computer hacking has evolved considerably over the past 20 years. What was once a “hobby” to demonstrate technical prowess, by breaking into systems and putting graffiti on web sites, then evolved into stealing as a way of gaining criminal financial reward. Continue reading

Is your browser in the Goldilocks zone?

19 Apr

If your web browser is too old, you will not be able to access sites using strong security.
If your web browser is too new, it will prevent you accessing sites with weaker security.

So most corporates will need to make sure their browsers are just right – the Goldilocks zone – not too weak, but not too secure. Continue reading

Trustworthy Wallets

5 Apr

Bitcoin is a subject that Cyber Matters first reported on two years ago, concluding it was premature to invest, unless you can afford to lose your stake. Since that time, the underlying Blockchain has been gaining an increase in interest. Continue reading

Another week, another IoT security scare!

19 Jan

With the recent events and stories hitting the news, such as CES 2016 announcing plenty of new IoT products and new toys being hackable, no wonder I couldn’t miss the opportunity to talk about them – the first thing to catch my eye this week was ……

Continue reading

Could PAS 754 have helped Juniper?

13 Jan

In an important Juniper security announcement last month it was revealed that:

“During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen® devices and to decrypt VPN connections.” Continue reading

Is your New Toy Hackable?

29 Dec

Over the last few days, many children will have received gifts of the latest interconnected toys. Sadly as a security community we know many of these will be insecure. Continue reading

Firestorm – how to avoid the latest Next Generation Firewall vulnerability

11 Dec

A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The vulnerability, dubbed FireStorm, allows an internal entity or malicious code to interact and extract data out of an organisation, completely bypassing the firewall limitation. Continue reading