Are we ready for the retro phone? Italian entrepreneurs, Massimo Cabigiano and Carlo Scattolini have no doubts. They have acquired the rights to the Commodore brand. With the Commodore 64 turning 30 the pair are launching the Commodore PET, a smartphone which runs Android 5.0 Lollipop and has a 5.5-inch … |More
Epic Games, maker of hit titles including Gears of War, Unreal Tournament and the legendary Unreal Gaming Engine have had their Games’ forums hacked. The forums have been taken offline and will only re-open once the issue is resolved. The current information on the website states:
Back in January, after the terror attacks in Paris, David Cameron proposed a number of new anti-terror laws. Within these were provisions for having cryptographic backdoors for the security services. He expressed the benefits of getting access to encrypted information whenever extreme circumstances occur. However as is often seen with … |More
Legacy Systems Blamed for Catastrophic Loss of Confidential Information at a US Government Organisation – How to Avoid It From Happening to You?
America is reeling from the shock of yet another devastating cyber attack, this time at the Office of Personnel Management (OPM), the Government department which holds details on the entire staff of the US government. Director of the OPM, Katherine Archuleta’s competence is now being questioned by the … |More
You have probably heard the recent news about the unknown hackers that exposed Hacking Team’s secrets. Hacking Team is a Milan-based company which makes Trojans and sells powerful surveillance tools to government and law enforcement agencies worldwide. The attack on them was carried out on Sunday evening – internal documents … |More
The New National Security Law – Protecting China’s Cyber Space or Just an Even Tighter Grip on The Already Strangled Internet?
China’s newly adopted National Security Law sets an expansive definition of national security that outlaws threats to China’s government, sovereignty and national unity as well as its economy, society, and cyber space interests. It also allows the government to control its Internet infrastructure in relation to any data deemed “critical” … |More
Our research suggests – probably not – phone-tapping affair is still relevant. Mrs Merkel has been at the centre of several recent spying scandals. The most recent one was related to Trojan malware being spread by using the German Chancellor’s computer (when the German Bundestag was hacked in May 2015). … |More
Currently industrial control systems (ICS) within the critical national infrastructure (CNI) are required to report breaches to the Government but it may result in fines and adverse activity in their share price. Therefore the likelihood of any relevant organisation not reporting a breach is relatively high. Best practice advice is … |More
The Draft Communications Data Bill (otherwise known as the Snooper’s Charter) was proposed in 2012 and since the Liberal Democrats were ousted from their coalition with the Conservatives there has been considerable pressure from Home Secretary Theresa May to bring it into law. The Bill essentially compels telecommunications providers to … |More