The UK Government published the first annual report on the implementation of the 2015 National Security Strategy. The strategy considers cyber security a top priority alongside the resurgence of state-based threats (Russiaâs actions in Syria and Ukraine) and the terrorism (extremism and instability). When dealing with the impact of technology, especially cyber threats the report […]
A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. […]
In a massive crackdown, European police and law enforcement agencies worldwide seized more than 4,500 domains trading fake brands. The Europol conducted a massive crackdown against websites offering counterfeit products as part of the campaign dubbed “Don’t F***(AKE) Up.” The European law enforcement agency aims to halt the activity of online scammers who offer for sale […]
The NIST Small Business Information Security: The Fundamentals guide aims to provide basic cybersecurity recommendations to small businesses. I have always stressed the necessity to improve cyber security posture for small businesses that are most exposed to threat actors across the world. Now the National Institute of Standards and Technology has released a cybersecurity guide to […]
Russia is going to ban Linkedin after a court ruling that found the professional social network  to be in violation of the country’s data protection laws. violation of the country’s data protection laws. On Thursday, a Moscow court has confirmed the decision to ban the professional social network LinkedIn in Russia. LinkedIn is violating the country’s data protection […]
The British Government announces an active defence posture in response to nation-state cyber attacks, Chancellor warns UK will retaliate against attacks. Hacking back, or “active defence” as security experts prefer to call it, is becoming a high debated argument. While the number of cyber attacks continues to increase and attackers are using even more sophisticated techniques, many Governments […]
Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back it. The Mirai botnet, this name is familiar to security experts due to the massive DDoS attack that it powered against the Dyn DNS service a few days ago. The Mirai malware was first spotted […]
The German Parliament passed a controversial surveillance law that seems to give more power to the BND intelligence agency. The German Parliament last week approved a controversial espionage law that theoretically will tighten oversight of the BND intelligence agency, but that according to privacy advocates will give more power to the authorities. The experts focused their […]
According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and rights groups are in revolt against the UK law enforcement that has purchased mobile phone snooping technology. The rights groups are protesting against the adoption of the IMSI-catcher technology that could be used for dragnet surveillance. The IMSI-catcher is […]
Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and other metadata. In January 2015, experts claimed that Apple is not able to read messages sent between devices through iMessages, but reported that the company but it is still able to access data in the backups. […]