Few ideas have done more to focus and clarify IT security strategy than the concept of a cyber attack chain. The attack chain (or kill chain in the original formulation) was first described by Lockheed Martin analysts in a seminal 2011 paper. In a nutshell, the attack chain is a logical sequence used by most […]

The long summer holidays are almost here in Australia. Yippee! For some parents, the idea of spending six weeks with their children is a truly joyous thought, for others – not so much. Getting through a six week vacation relatively unscathed might seem very ambitious.  Arguments around going places, spending money and screen time can […]

New year = new attack vectors. With the holidays in full swing and 2014 coming to a close, McAfee Labs has produced their latest Threats Report. In it, key security predictions for the coming year are discussed, including forecasts around increases in cyber espionage, more frequent attacks on the Internet of Things, and the ‘explosion’ […]

Scammers love to sell “Flash Player” for Android to careless users who are easily deceived. Although a series of these scam apps were deleted from the official Android app store after our recent report, malicious apps such as Android/Fladstep have reappeared in the store. This time scammers are promoting their sales tools using the RSS […]

Have you made your list of New Year’s resolutions yet? It appears that Google has, and helping make the Internet a safer place is one of them. The company has announced that in 2015, they intend to take a more proactive approach to informing Chrome users that websites beginning with ‘HTTP’ do not securely store […]