What is an evil maid attack

The once famous ‘Evil Maid’ is again making a comeback. A security firm, F-Secure has issued a fresh warning about possible evil maid attacks by exploiting Intel’s Active Management Technology and other techniques. The spate of fresh evil maid attacks in the wild were discovered by F-Secure senior security consultant Harry Sintonen. Investigations by Sintonen […]

Wetware: The Often-Overlooked Crucial Factor in Cybersecurity

Read Phil Keys’ article about wetware and how it is crucial factor in cyber defense on Forbes : Cybersecurity. With all of the continuing successful cyber-attacks on critical infrastructure such as finance and energy, this word is probably more top of mind than at any other time in history. Read his full article here.

The internet of things: Why it matters

Read Anmar Frangoul’s article about why Internet of Things matters on CNBC : The iPod, Facebook, “smart” televisions: the 21st century has seen a host of innovations that have transformed the way we live. The rise of the so called internet of things, or IoT, is another technological development that is starting to become an increasingly common […]

The ‘internet of things’: what it is and why business is taking it seriously

Read Mark Hillsdon’s article about Internet of things and why businesses are taking it seriously on The Guardian : The internet of things (IoT) is revolutionising how we live, from the way we control our central heating, to wearable fitness trackers that tell us how far we’ve walked. It’s also beginning to usher in what […]

DDoS explained: How denial of service attacks are evolving

Read George V. Hulme’s definitive article about distributed denial of service (DDoS) on CSO Online : A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a service to be delivered. This can be achieved by thwarting access to virtually anything: servers, devices, services, networks, applications, […]

Phishing: The basics

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Typically, a phisher sends an e-mail disguised as a legitimate business request. For example, the phisher may pass himself off as a real bank asking its customers to verify financial data. Read the analytical article giving basics of phishing attacks […]

What is a DDoS attack? What happens during a DDoS attack?

DDoS attacks are one of the most common forms of cyber attack, with the number of global DDoS attacks increasing to 50 million annually, according to VeriSign. Distributed denial of service, or DDoS for short, refers to a cyber attack resulting in victims being unable to access systems and network resources, essentially disrupting internet services. Read […]

What is hacking?

The cyber attack saw a harmful computer programme spread to about 150 countries, including the UK, Spain, Russia, the US and China. The program – which is called WannaCry – has caused chaos for many organisations. Read about what is hacking on BBC News.

Real words or buzzwords?: Open

The word “open” is usually used in conjunction with other words, most commonly Open Architecture and Open Platform in the physical security industry. They appear in product promotional materials, manufacturer Architect and Engineer (A&E) product specifications, as well as in the system performance specifications of design-build projects. Read what the term open architecture and open […]

What Is the Internet of Things?

Read Chris Neiger’s definitive article about Internet of Things on The Motely Fool : Defining the Internet of Things (IoT) can be simplified down to the connection of everyday things — like homes, industrial equipment, watches, etc. — to the internet, for the purpose of collecting data, tracking usage, and automating systems. While it encompasses many […]