The smart gun has moved out of science fiction, and is now science fact. But just how smart, and how secure, are they?
IT Security Thing has been getting a handle on the industry perspective regarding WannaCrypt0r and the attack on the NHS
I’ve had my hands on the iStorage diskAshur PRO 2 – what is being described as the ‘most secure hard drive ever made’ for more than a week now and I have been able to put it to the test
IT Security Thing we met with Joseph Opacki, VP at PhishLabs, who spoke about the latest organisational phishing threats, such as Business Email Compromise (BEC).
The Vault 7 leak consists of more than 8,000 pages of classified material that describes in detail the methodology and technology used by the CIA to spy on targets.
The ModPOS threat has been described both as “the most sophisticated point-of-sale malware we have seen” and “a complex, highly functional and modular code base…”
Researchers from cyber security consultancy Hacker House, as part of a Sky News investigation, have found a number of NHS trusts fall short when it comes to online data security.
While military intelligence is often used as a prime example of an oxymoron, there’s nothing moronic about security intelligence; without it your organisation would be much more vulnerable. So, what exactly is security intelligence then?
There is no doubting that WordPress is popular, very popular. In use by around 25% of the top 10 million websites currently, that gives it a content management system market share of 59%, which makes WordPress security very important.
Here at IT Security Thing we are on a mission to inform, educate and engage and that’s why we cannot get fully behind 11 year old Mira Modi who is selling secure passwords from her bedroom in New York City.
If ransomware is rubbish, as one vendor insisted recently, then why is it so successful? IT Security Thing found itself in Dublin recently, living the rock and roll lifestyle. Well, I stayed in a hotel owned by Bono and The Edge from U2 if that counts. It’s certainly a close call, as one of my afternoons […]
There’s an interesting article that has just been published in the MIT Technology Report that gels with our findings here at IT Security Thing; namely that when it comes Chinese cybercrime, China gets as good as it gives when it comes to cyber-attacks.
A recent incident highlights how the security industry could well be pushing legitimate researchers into being black hat hackers
Safe Harbor agreement was a crock. It’s time to start taking privacy seriously!
TalkTalk has been breached; we know that much. What else we know about it is, in actual fact, very little indeed at this stage.
Just as malware is malicious software, so we have malvertising, which is malicious advertising. Unlike malware though, malvertising can literally eat away at your revenue stream if you are an online content provider.
University of Cambridge researchers found, “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.”
According to the Women’s Society of Cyberjutsu only 11 per cent of those working in the cybersecurity industry worldwide are women. That is, frankly, a shocking statistic.
Last year security vendor AVG researchers discovered that a popular banking Trojan, a Vawtrak variant, was using steganography as a method of obfuscating update files.
In the Poseidon Adventure movie, passengers aboard a cruise ship struggle to survive after a tidal wave strikes. Those enterprises hit by the Poseidon APT Group must know how that feels.
Forgotten your password? A new form of biometric authentication technology is looking into using your skull, and not fingerprints, to log you in.