WinRAR Vulnerability: A Vintage Threat

For users with might consider themselves of a certain ‘vintage’, they will almost certainly have come across the archiving/zipping tool WinRAR in their cyber travels. For those that don’t know, in medieval times, the ability to compress and uncompress (zip/unzip) files and folder wasn’t natively baked-in to Windows and other operating systems. If you want…

Read more

The BA breach – where did it go wrong?

The British Airways breach that ran between August and September 2018 caused a small stir in the media but was in fact distinctly different from many of the breaches we hear about. Firstly, most data breaches are a “heist” – criminals break in to a system, identify files, databases and intellectual property of value (whether…

Read more

Hacking Phase 2: Enumeration

It never ceases to amaze us that people’s perception of hacking is very rarely close to the reality, probably in most cases down to sensationalism and the film industry. Films tend to either paints hackers as socially awkward geeks or fanatical villains (such as Raoul Silva) who write an AI or build a super computer…

Read more