combatcyber

Latest posts

Telugu Chaos

Can you imagine our surprise, when we found out that there is a superb yet super easy way to crash numerous iOS devices with just one character?

The bug was first spotted by an Italian Blog called Mobile World. It's essentially a text bomb and it requires users to send one single character from the language called Telugu - a native Indian language that's spoken by over 70 million people in India. 

Here is what the character looks like: 

Email Security.

With multiple mass cyber break-ins and hackers giving all their efforts to destroy any sense of security we may have in our communications, it's natural to be concerned about the level of security that email service providers can actually give.

The email giants are all experiencing a great deal of change when it comes to their security strategy and approach, and rightly so.

Bitcoin Nazis

Many have tried to clampdown on Bitcoin regulation, including steps taken by the Chinese to end Bitcoin mining, South Koreas' total Bitcoin ban and Egypt's call for branding Bitcoin as "haram'.

Yes, powerful leaders are shaking in their boots and yet, decentralized digital trading has continued to grow exponentially.

When should an organization report a data breach?

No matter what its size or cybersecurity posture, your organization is vulnerable to cyber crime and data breaches. Under federal, state, and international laws, once organizations become aware of a breach they have a certain amount of time to report it to the relevant supervisory authority. Sitting on an incident without reporting it puts organizations at risk of legal and other ramifications.

Trouble on the horizon: what ENISA’s Report tells us about the threat of data breaches

Last month, the European Union Agency for Network and Information Security (ENISA) published its 2017 ‘Threat Landscape Report’1. The Report comments on general trends in the area of cybercrime, and identifies and gathers data on 15 top “cyber-threats”. Many of the threats identified in the Report are designed to target vulnerable individuals. However, one particularly topical cyber threat draws concern both from individuals and organisations: the increasing threat of large scale data breaches.

Knowledge Is Power in the Battle to Control Our Data

The sheer amount of data we generate on a daily basis can be more than 300 MB each day and sharing some of this information is a part of modern life. Attempting to control who collects, uses and shares our personal information requires technical tools and know-how and a basic understanding of what risks can ultimately emerge. But before anyone offers up a standard set of tips for how best to manage your privacy, it’s worth taking a moment to learn more about the complex data ecosystem in which we all now live – and what that means for controlling information about us.

Identity fraud enters a new era of complexity

The 2018 Identity Fraud Study found that despite industry efforts to prevent identity fraud, fraudsters successfully adapted to net 1.3 million more victims in 2017, with the amount stolen rising to $16.8 billion. With the adoption of EMV cards and terminals, the types of identity fraud continued to shift online and away from physical stores. The complexity of fraud is also on the rise as criminals are opening more new accounts as a means of compromising accounts consumers already have.

The two most important ways to defend against security threats

An average of 5,000 to 7,000 new computer security threats are announced each year. That’s as many as 19 every day. The rate at which new threats appear make it difficult to decide which ones require your attention. It might surprise you that, while your competitors waste money on high-tech, expensive, and sometimes exotic defenses, you can get far more value by concentrating on just two things you already do.

Vast majority of NHS trusts have failed cyber security assessment, Brit MPs told

Every single one of the 200 NHS trusts in the UK so far assessed for cyber security resilience has failed an on-site assessment, MPs on the Public Accounts Committee were told yesterday.

There are a total of 236 trusts. There is no timeline on when the remaining 36 will be checked over.

In a hearing about the WannaCry incident last June, entitled "Cyber-attack on the NHS", Rob Shaw, deputy chief exec of NHS Digital, denied it was the case that those bodies who didn't get a passing grade had not done anything over cyber security.