Commissum

cybersecurity experts uk


The Investigatory Powers Bill Has Been Granted Royal Assent and is Now UK Law



The Investigatory Powers Bill Has Been Granted Royal Assent and is Now UK Law

We haven’t heard much lately about the Investigatory Powers Bill – dubbed the “Snooper’s Charter” by its opponents – and to be fair there’s been quite a lot on. We’ve had Brexit and its fallout, the Rio Olympics, Internet of Things botnets running wild, and now President-elect … |More

Cybersecurity Takes You Places – Commissum’s Globetrotting October



Cybersecurity Takes You Places – Commissum’s Globetrotting October

Where has the year gone? It’s November already and we’ve seen some big changes here at Commissum HQ.

Looking back to January, we moved into our new offices at the Shore in Edinburgh. Since then our team has increased by half – with Caius, Jack, … |More

Thoughts on Threats #2 – Web-based Attacks Hidden in Plain Sight



Thoughts on Threats #2 – Web-based Attacks Hidden in Plain Sight


Back in August, we kicked off the Thoughts on Threats series with a look at the top-rated threat in ENISA’s Threat Landscape study from 2015. In this installment, we’re heading down the list to the number two spot for a closer look at one of the web’s … |More

Supporting Growth in Cybersecurity Skills



Supporting Growth in Cybersecurity Skills

Cybersecurity is one of the most exciting and progressive careers out there. Computing and STEM graduates currently have their pick of cybersecurity career paths as the number of opportunities seems to greatly outstrip the number of candidates.

With the average salary for cybersecurity jobs on the up … |More

Mossack Fonseca – History’s Biggest Data Breach?



Mossack Fonseca – History’s Biggest Data Breach?


On Sunday 10th April the ICIJ (International Consortium of Investigative Journalists) in joint action with over 190 of its partners began publishing details of the 11 million leaked documents of the world’s 4th biggest offshore law firm, Panama’s Mossack Fonseca. The scale of the leak … |More

Is Your Healthcare Device Hackable?



Is Your Healthcare Device Hackable?



Healthcare is a very personal subject for most of us. Therefore, the last thing we want is for something to go wrong. However, the healthcare sector is one of the most complicated industries, and its cybersecurity is particularly complex. Not surprisingly, ransomware in medical devices is … |More

Uconnect and Chrysler: The Most Dangerous Cybersecurity Flaw of the Decade?



Uconnect and Chrysler: The Most Dangerous Cybersecurity Flaw of the Decade?

Most cybersecurity weaknesses put personal data, company information, or intellectual property at risk of being hacked. The weakness in Chrysler’s Uconnect infotainment feature could lead to people literally being driven off the road.

The Flaw
Fiat Chrysler Automobiles (FCA) has been manufacturing cars of all types for decades. This exploit … |More

Malvertising – the Colossal Squid of Cyber Attacks!



Malvertising – the Colossal Squid of Cyber Attacks!

Lurking deep in the depths of legitimate online websites is malvertising, a lesser known but just as insidious type of malware. Its tentacles spread deep and wide across the internet. Websites you visit every day have been compromised. YouTube, Yahoo and Spotify – to name a few!

According to the … |More