Commissum


Windows 10



Windows 10

The excitement is mounting to record highs! We can’t wait to get our keyboard-tapping fingers on the new Windows 10 to be released in a couple of months (end of July based on a leak from AMD). The new OS is promising to be what Windows 8 never managed to … |More

Let’s Encrypt



Let’s Encrypt

Encryption, Encryption, Encryption. That is what some believe to be the solution to our information protection and assurance problems. Last week, we discussed the now-defunct True Crypt, which could be used to scramble data stored on a range of devices from USB keys, to hard drives and SDDs in … |More

Iris Scanner Bypass



Iris Scanner Bypass

Let’s be honest here: Fingerprint sensors are so 2014. As is the ability to to bypass them. But what if you’re a researcher with vast amounts of knowledge and a willingness to prove the insecurity of everything? What are you going to go after next?

Security researcher Jan Krissler, of … |More

Advanced Detection and Monitoring



Advanced Detection and Monitoring

It’s episode 2 of ‘How to build the Internet’s Fort Knox’. We are convinced you spent this past week squashing bugs, patching holes, and preparing for an invasion from the Internet. You are now awaiting instructions on how to get all this waiting, monitoring, listening to someone who can handle … |More

Cyber Security Export – Human Rights Violation?



Cyber Security Export – Human Rights Violation?

It’s fairly obvious that selling guns to foreign powers carries heavy ethical concerns, and can land the seller in a lot of trouble if not conducted in accordance with the law. But what about cyber security products? Could the sale of web filters and monitoring software lead to a breach … |More

Regin, A Thoroughly Developed Malware



Regin, A Thoroughly Developed Malware

Stuxnet, Duqu, Flame, Wiper, what all of these have in common, apart from the fancy names, is a place of honour in the all-time Hall Of Fame of malicious computer programs (if there would ever be such a thing). Just recently, what is considered by the malware analysts at Symantec|More

Threat Status



Threat Status

Every once in a while, we need to stop for a moment and look at where we are, to analyse and understand our current situation in order to better face the uncertainties ahead. The more angles we consider during our analysis, the better the overall picture we will have when … |More