Commissum

Blog


Cyber Security Export – Human Rights Violation?



Cyber Security Export – Human Rights Violation?

It’s fairly obvious that selling guns to foreign powers carries heavy ethical concerns, and can land the seller in a lot of trouble if not conducted in accordance with the law. But what about cyber security products? Could the sale of web filters and monitoring software lead to a breach … |More

Regin, A Thoroughly Developed Malware



Regin, A Thoroughly Developed Malware

Stuxnet, Duqu, Flame, Wiper, what all of these have in common, apart from the fancy names, is a place of honour in the all-time Hall Of Fame of malicious computer programs (if there would ever be such a thing). Just recently, what is considered by the malware analysts at Symantec|More

Drupageddon Causes Massive Security Headache



Drupageddon Causes Massive Security Headache

2014 has been an interesting year for security bugs, as we have seen a number of long-standing vulnerabilities come up to light, ruining many IT administrator’s morning coffee. The now well-known issues such as Shellshock, Heartbleed and POODLE are vulnerabilities that existed in the code used on a widespread scale … |More

Commissum Exhibit at London Law Expo 2014



Commissum Exhibit at London Law Expo 2014

On Tuesday 14th October, Commissum exhibited at what was the largest conference for C-level professionals from the entire legal sector – ‘London Law Expo 2014′. The event was completely sold out, and was attended by over 3000 visitors.

The Commissum stand was visited by a wide range of conference … |More

Tyupkin ATM Malware Dispenses Free Money



Tyupkin ATM Malware Dispenses Free Money

Money has always been a strong motivator, particularly for criminal activity, and this pursuit of filthy lucre is unlikely to change in our lifetime. Developing malware is time-consuming, and making it effective and indetectable is difficult, so there must be a clear means of realising a financial reward. That must … |More

BadUSB Bites Back



BadUSB Bites Back

In today’s digital world, it is hard to believe there is anyone who has not yet touched a USB device. Currently in its third iteration, the USB (Universal Serial Bus) protocol can be found in almost every device, ranging from storage and input devices, to desktop toys and almost everything … |More

Commissum Radio Comment on Celebrity Nude Pics Hack



Commissum Radio Comment on Celebrity Nude Pics Hack

Constantly being in the glare of the media spotlight is an accepted fact of life for celebrities, with their every move documented on camera by the press, their publicists, and the general public. It seems that our own inquisitiveness has overtaken any consideration for any individual, famous or not, to … |More

US Companies Struggle to Rebuild Trust



US Companies Struggle to Rebuild Trust

The power of the Internet was in their hands. Most of the significant technological advancements came from them. Almost all the large corporations involved in communications, cloud technology, networking and digital information are based there. Nonetheless, the world’s trust in US-based companies is shrinking; following last year’s revelations about the … |More

The (In)Security of The Internet of Things



The (In)Security of The Internet of Things

Every day, more and more devices get free access to the Internet. They are increasing in number and diversity, but protection for these devices is not improving at the same pace. A road sign warning motorists of a ‘Godzilla Attack’ close to San Francisco could have been seen recently, and … |More