Our thoughts, industry views and technology trends

Featured

Contributor:
James.Maude
January 23rd, 2015

Malvertising Campaigns – Who can you trust?

Malware is an ever evolving field and as such security should be seen as a journey not a destination. One of the latest malware evolutions is the practice of Malvertising where attackers place malicious content in seemingly innocent adverts. When the user views the page the advert is loaded and the malware attempts to exploit the machine.

 

Continue Reading

Malvertising Campaigns – Who can you trust?

Malware is an ever evolving field and as such security should be seen as a journey not a destination. One of the latest malware evolutions is the practice of Malvertising where attackers place malicious content in seemingly innocent adverts. When the user views the page the advert is loaded and the malware attempts to exploit the machine.

Continue Reading


Taking the fear out of Java and Flash vulnerabilities

Over recent weeks, security concerns around Java and Flash vulnerabilities have risen to the surface once again. In December the National Defense Radio Establishment in Sweden was exposed for having significantly outdated versions of popular apps running, leaving the government organization wide open to cyber attack.

Continue Reading


Return of the Macro

Just like fashion, malware goes through trends and comebacks, so let’s take a look at what’s ‘in’ this season. Anyone involved in IT in the 1990′s will remember a few things; plaid shirts, floppy disks and macro viruses. Although I can’t envisage the former two making a comeback any time soon, macros are definitely back on the InfoSec agenda, something Microsoft has been highlighting recently.

Continue Reading


Five New Year Security Resolutions

Many of us usher in the New Year with a set of aims or ambitions. If you’ve made a vow to get a better grip of IT security in 2015, what can you do to quickly and easily improve your security posture in the year ahead? Here we take a look at the top 5 quick wins.

Continue Reading


From Year of the Breach to Year of the Solution

As 2014 ends, many experts in the industry are giving their thoughts on what the New Year will look like from an IT security perspective. From the top ten malware threats to a growing list of security challenges, you’d be forgiven for thinking that CIOs and CISOs face an uphill battle in 2015.

Here, we look at the 3 key things that should be on your radar for the next 12 months and how, through a positive approach to security, you can overcome the most common challenges.

Continue Reading