World Password Day won’t solve the numbnuts user problem
It may have been world password day recently, but people need to do more to up their own security settings.
Davey Winder Research credentials, password, research 0 Comments
It may have been world password day recently, but people need to do more to up their own security settings.
Davey Winder Research Apple, Hacking, iOS, iPad, iPhone, Sandjack, Vulnerability 0 Comments
We get inside the tale of the iOS SideJacking app vulnerability that Apple knows about but hasn’t patched yet. Are you sitting comfortably? Then we’ll begin.
Davey Winder Cybercrime, Hacking, Research DDoS, Exploit kits, Script kiddie 0 Comments
There are some handy hackers out there, no doubt; but hacking by hand is becoming an increasingly scarce commodity with the rise of automatic cybercrime.
Davey Winder News, Research Authentication, Biometric, passwords 0 Comments
Forgotten your password? A new form of biometric authentication technology is looking into using your skull, and not fingerprints, to log you in.
Davey Winder Research Cybersecurity, Equality, Industry, Women 0 Comments
According to the Women’s Society of Cyberjutsu only 11 per cent of those working in the cybersecurity industry worldwide are women. That is, frankly, a shocking statistic.
Davey Winder Research attack, Backdoor, Hacking, payload, Phishing 0 Comments
In the Poseidon Adventure movie, passengers aboard a cruise ship struggle to survive after a tidal wave strikes. Those enterprises hit by the Poseidon APT Group must know how that feels.
Davey Winder Research Cloud, Cybersecurity, DDoS, Malware, Ransomware, Threatscape 0 Comments
If you want to get a real-world handle on how the cybersecurity threatscape is being shaped, and therefore understand both threat evolution patterns and the best methods to mitigate against the resulting attacks, quarterly research reports are your best bet.
Davey Winder Research Android, Patch, Smartphone, Update 0 Comments
University of Cambridge researchers found, “on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities.”
Davey Winder Research Concealment, exploit, Malware, Steganography, Tor, Trojan 0 Comments
Last year security vendor AVG researchers discovered that a popular banking Trojan, a Vawtrak variant, was using steganography as a method of obfuscating update files.
Davey Winder Research exploit, Malvertising, Malware, payload, Vulnerability 0 Comments
Just as malware is malicious software, so we have malvertising, which is malicious advertising. Unlike malware though, malvertising can literally eat away at your revenue stream if you are an online content provider.