26 June 2014

Phishing attacks continued to be prominent in the first quarter of 2014, including the traditional targets of Paypal and Apple, as well as a disturbing new wave of …

10 April 2014

A serious flaw in OpenSSL was announced on 7th April 2014  (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160).  OpenSSL implements the Secure Sockets Layer and Transport Layer Security protocols and is widely used to …

19 December 2013

In 2012, we all became pretty familiar with hackers, getting to know their groups like Anonymous, Lulzsec, and others like them.  The activities of these high-profile hackers have …

19 December 2013

Increasingly, VoIP solutions are under attack.  We see IP PBX’s being targeted by toll fraud, DDoS or being hacked as companies keen to benefit from the undoubted advantages …

19 December 2013

Frequently there is a lot that can be done with existing equipment to improve an organisation’s security posture.  This not only improves general security, it can help an …

19 December 2013

Use Cases, used well   Security Information and Event Management (SIEM) can be a massively useful tool in helping organisations discover Spam bots on their networks, identify malpractice …

19 December 2013

When people talk about Virtual LANs (VLANs), they tend not to focus on the security features of this versatile network topology.  However, there are several tangible security vulnerabilities …

19 December 2013

Virtual Local Area Networks (VLANs) present a number of advantages.  They can add to a layered defence and improve the flexibility of network design.  However, if they are …

19 December 2013

Voice over IP (VoIP)  systems are increasingly popular.  However, IP-based private branch exchanges (PBXs) are being hacked or targeted by toll fraud and distributed denial of service (DDoS) …

19 December 2013

Advanced Persistent Threats (APT) are much talked about and used in a lot of marketing but what exactly are they?  Many commentators indicate that they are more persistent …