Blog

Network Security Architectures for the Public Cloud

Network Security Architectures for the Public Cloud Cloud adoption has continued to grow as more organisations implement a cloud-first strategy in support of digital transformations, mobility and IT agility. Organisations are at very different stages in their adoption, with a small percentage of organisations having more than half of their workloads in the public cloud. Despite the relatively low percentage of workloads in the cloud so far, an impressive 77 per cent of enterprises have Read more…

Mass Surveillance, Repressive Regimes, and the Hacking Team

On Monday, 13th July 2015 the Italian company ‘Hacking Team’, who design and develop surveillance software specifically to aid governments around the globe in hacking their own citizen’s devices, was itself the victim of a devastating hack. The company has been shrouded in controversy since Paris-based Reporters Without Borders listed it as a ‘Corporate Enemy’ of the Internet in 2013. The list consisted of ‘Digital Mercenaries’ that have sold their surveillance software to authoritarian regimes. Read more…

Windows 10, Pay with Your Privacy

Windows 10 is finally here and the reviews are fantastic; everyone loves it. 24 hours after its release 14 million people had already downloaded and installed it. Yes, anything could have been better than the unbearable Metro menu of Windows 8, but it seems Microsoft have finally been able to built a multi-platform operating system that suits everyone’s needs. The new OS has been branded a faster, slicker version of Windows 7 by the media. Read more…

Researchers Unveil Better, Faster Alternative to Tor

The Onion Router – more commonly known as Tor – is a network that provides a high degree of anonymity by encrypting a user’s data multiple times on multiple levels. The data is routed through volunteer relays on Tor’s network. Each time the data reaches a relay a layer is removed and the next location is revealed. This makes it almost impossible to know the data’s source and destination, without first knowing the path that Read more…

Lenovo’s Rootkit like Technique to Install Bloatware

Lenovo used a Rootkit like technique to reload bloatware into clean installs of Windows operating systems, leaving customers open to attack. Not long after Lenovo were caught selling computers with SSL hijacking malware pre-installed on them, another breach of their customers trust has been unveiled. Lenovo have been selling computers with an altered BIOS firmware that automatically downloads Lenovo tools and services. The BIOS is the first piece of software that runs when a PC Read more…

BitTorrent Vulnerabilities Exploited for DDoS Attacks

Security Researchers have discovered vulnerabilities in BitTorrent that can be exploited to run powerful Distributed Reflected Denial of Service (DRDoS) attacks that have the potential to bring down parts of the Internet. The research, carried out by Florian Adamsky at City University London, demonstrates how BitTorrent’s open protocols can be exploited to produce powerful DRDoS attacks. Some of the worlds most widely used BitTorrent programs, including Vuze, uTorrent and MainLine are vulnerable. Distributed Denial of Read more…