Back in January, after the terror attacks in Paris, David Cameron proposed a number of new anti-terror laws. Within these were provisions for having cryptographic backdoors for the security services. He expressed the benefits of getting access to encrypted information whenever extreme circumstances occur. However as is often seen with … |More
Legacy Systems Blamed for Catastrophic Loss of Confidential Information at a US Government Organisation – How to Avoid It From Happening to You?
America is reeling from the shock of yet another devastating cyber attack, this time at the Office of Personnel Management (OPM), the Government department which holds details on the entire staff of the US government. Director of the OPM, Katherine Archuleta’s competence is now being questioned by the … |More
You have probably heard the recent news about the unknown hackers that exposed Hacking Team’s secrets. Hacking Team is a Milan-based company which makes Trojans and sells powerful surveillance tools to government and law enforcement agencies worldwide. The attack on them was carried out on Sunday evening – internal documents … |More
The New National Security Law – Protecting China’s Cyber Space or Just an Even Tighter Grip on The Already Strangled Internet?
China’s newly adopted National Security Law sets an expansive definition of national security that outlaws threats to China’s government, sovereignty and national unity as well as its economy, society, and cyber space interests. It also allows the government to control its Internet infrastructure in relation to any data deemed “critical” … |More
Our research suggests – probably not – phone-tapping affair is still relevant. Mrs Merkel has been at the centre of several recent spying scandals. The most recent one was related to Trojan malware being spread by using the German Chancellor’s computer (when the German Bundestag was hacked in May 2015). … |More
Currently industrial control systems (ICS) within the critical national infrastructure (CNI) are required to report breaches to the Government but it may result in fines and adverse activity in their share price. Therefore the likelihood of any relevant organisation not reporting a breach is relatively high. Best practice advice is … |More
The Draft Communications Data Bill (otherwise known as the Snooper’s Charter) was proposed in 2012 and since the Liberal Democrats were ousted from their coalition with the Conservatives there has been considerable pressure from Home Secretary Theresa May to bring it into law. The Bill essentially compels telecommunications providers to … |More
In the world of Hollywood blockbusters, our biggest security threats come from murderous robots intent on enslaving mankind. But surely that’s just fiction, the stuff of the silver screen? What if Skynet really did become self-aware, and our days are numbered?
Recently in Geneva, members of the 1980 UN Convention … |More
ISIS banned Apple products in the Islamic government, the Caliphate, more than half a year ago, mainly due to the fear of being tracked. Their statement issued on the 14th December, 2014 stressed the need of forbidding the use of any electronic devices or systems that can identify specific GPS … |More