Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly a notice flashes on your screen saying your computer has been compromised and in order to get your files back, you need to pay up some money. This, ladies and gentlemen, is ransomware, a nasty […]

Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A quick search of the National Vulnerability Database shows 277 vulnerabilities reported in Flash Player since 2011. For Flash zero-day attacks (which means that there was no patch from Adobe when the vulnerability was exploited), researcher […]

originally posted to Dark Reading:  Intel Security Perspectives What too many of the year’s high-profile data breaches had in common. The only thing more depressing than the increasing frequency and growing scale of the cyber attacks in this year’s headlines was the consistency of key attributes across so many of the events. From the retailer […]

Few ideas have done more to focus and clarify IT security strategy than the concept of a cyber attack chain. The attack chain (or kill chain in the original formulation) was first described by Lockheed Martin analysts in a seminal 2011 paper. In a nutshell, the attack chain is a logical sequence used by most […]

The long summer holidays are almost here in Australia. Yippee! For some parents, the idea of spending six weeks with their children is a truly joyous thought, for others – not so much. Getting through a six week vacation relatively unscathed might seem very ambitious.  Arguments around going places, spending money and screen time can […]