Dan Brown
  • Home
  • Blog
  • Twitter
  • LinkedIn

cyber security

Architecture

Network Security Architectures for the Public Cloud

Network Security Architectures for the Public Cloud Cloud adoption has continued to grow as more organisations implement a cloud-first strategy in support of digital transformations, mobility and IT agility. Organisations are at very different stages in their adoption, with a small percentage of organisations having more than half of their Read more…

By Dan Brown, 3 years14th February 2020 ago
Data Breach

Mass Surveillance, Repressive Regimes, and the Hacking Team

On Monday, 13th July 2015 the Italian company ‘Hacking Team’, who design and develop surveillance software specifically to aid governments around the globe in hacking their own citizen’s devices, was itself the victim of a devastating hack. The company has been shrouded in controversy since Paris-based Reporters Without Borders listed Read more…

By Dan Brown, 8 years5th September 2015 ago
Online Privacy

Windows 10, Pay with Your Privacy

Windows 10 is finally here and the reviews are fantastic; everyone loves it. 24 hours after its release 14 million people had already downloaded and installed it. Yes, anything could have been better than the unbearable Metro menu of Windows 8, but it seems Microsoft have finally been able to Read more…

By Dan Brown, 8 years31st July 2015 ago
Online Privacy

Lenovo’s Rootkit like Technique to Install Bloatware

Lenovo used a Rootkit like technique to reload bloatware into clean installs of Windows operating systems, leaving customers open to attack. Not long after Lenovo were caught selling computers with SSL hijacking malware pre-installed on them, another breach of their customers trust has been unveiled. Lenovo have been selling computers Read more…

By Dan Brown, 8 years5th May 2015 ago
Security Exploit

BitTorrent Vulnerabilities Exploited for DDoS Attacks

Security Researchers have discovered vulnerabilities in BitTorrent that can be exploited to run powerful Distributed Reflected Denial of Service (DRDoS) attacks that have the potential to bring down parts of the Internet. The research, carried out by Florian Adamsky at City University London, demonstrates how BitTorrent’s open protocols can be Read more…

By Dan Brown, 8 years5th March 2015 ago
  • 14 Essentials Steps to Protect Yourself From Cybercrime
  • Blog
  • Front Page
  • Login Customizer
  • Skills
  • Take Back Control of Your Online Privacy
Hestia | Developed by ThemeIsle