The BA breach – where did it go wrong?

The British Airways breach that ran between August and September 2018 caused a small stir in the media but was in fact distinctly different from many of the breaches we hear about. Firstly, most data breaches are a “heist” – criminals break in to a system, identify files, databases and intellectual property of value (whether…

Read more

Webcam Cover Up

A question we’re frequently asked is around the threat posed by webcams. Actually its rarely phrased as a question but rather an assumption along the lines of “You don’t really need to cover webcams though do you?”. Alas at this point we take a collect breath and prepare to tell people something they’d rather not…

Read more

Hacking Phase 2: Enumeration

It never ceases to amaze us that people’s perception of hacking is very rarely close to the reality, probably in most cases down to sensationalism and the film industry. Films tend to either paints hackers as socially awkward geeks or fanatical villains (such as Raoul Silva) who write an AI or build a super computer…

Read more

Spam Bot Hall of Shame

After seeing some of the awful attempts at bot-driven comments made to link to websites (presumably to drive SEO), we decided to start keeping a log of them. We figure it may help others identify suspicious comments and – well – it was kind of fun to see how bad they are. I am extremely…

Read more