Saturday , December 16 2017
Menu
Home / 2017 / November

Monthly Archives: November 2017

Hacker or Terrorist? Where Does the Line Get Drawn?

This week saw another headline related to cyberattacks on energy utilities. There’s a pattern building here: Attacks in the US, Ireland, UK, Ukraine, and elsewhere raise the concern that real damage will be caused sooner or later, and potentially lives will be lost. In the best case, this would be …

Read More »

Blockchain: Removal of Trust, or Evolution of Trust?

Phys.org has a thought-provoking piece on the evolution of trust in the cryptocurrency world. Without a government or company to rely upon, as is the case with more traditional financial tools, this article proposes that trust still exists but that it is the technology itself in which users place their …

Read More »

Web Improvement Tools Accidentally Collecting Personal Data?

A Princeton research group has been investigating the potential privacy impact of web session recording and replay software, used to monitor the usability of websites and the effectiveness of layout changes or advertisements. Wired reports that, in effect, the researchers say software companies are “looking over your shoulder” as you …

Read More »

Uber’s Data Breach Trifecta

Details emerged this week of a 2016 data breach at Uber compromising 57 million accounts (names, emails, cellphone numbers) plus further details, including license numbers of 600,000 US-based drivers. What’s more disturbing than the breach itself–although that’s important–is the way key individuals at Uber treated it. Rather than complying with …

Read More »

Machine Learning Applied to Cybersecurity

An interesting announcement this month came from Shape Security, who have launched the Blackfish system to identify and block stolen credentials earlier in the lifecycle. The problem is a growing one, with in excess of 3 billion sets of credentials reported stolen last year. According to the product website: “Instead …

Read More »

Bumper Harvest of Application Patches

Memory corruption and script engine flaws in the Internet Explorer and EDGE browsers, an attack vector potentially allowing a malicious spreadsheet to infect a user’s PC because of a problem disabling macros properly, and a significant set of updates for Adobe Acrobat and Reader. As ever, our advice on the …

Read More »