Latest hacking publications

Heartbleed, GOZeuS and CryptoLocker: Will your network let you down?

With the rise of prolific vulnerabilities like Heartbleed affecting SSL connections, what can businesses do to secure themselves against them? David Barker looks at examples of recent internet vulnerabilities and how businesses can protect against attack. Heartbleed – what is it? Heartbleed is a computer bug which affects SSL certificates and encryption (SSL certificates are… Read More

The GCHQ lawsuit and its ramifications for the future of the internet and users’ rights

Accusations that the UK government’s surveillance operation, GCHQ, used malicious software to hijack users’ computers and smartphones, have led to renewed calls for better protection of online users’ rights. Following on from the recent controversy around mass government surveillance sparked by Edward Snowden’s revelations earlier this year, these new allegations by seven international ISPs have… Read More

ISPs to take GCHQ to court over suspected attacks on international infrastructure

Seven multi-national internet providers are to take legal action against the UK government’s monitoring post, GCHQ, following reports that the organisation has attacked and exploited network infrastructure for ‘mass surveillance.’ This is the first time that GCHQ has faced any such action and stems from complaints about articles published earlier in 2014 in Der Spiegel. The… Read More

Preparing for the denial of service attack

Denial of service attacks come in many forms but their effect can be devastating for the victim business. David Barker, the technical director of 4D Hosting, describes the different types of attack and what the service provider can do to protect their network. Historically, distributed denial of service (DDoS) was just an annoyance, but in… Read More

Data in the cloud, security on the ground

Physical security of a data centre is just as important as cloud security argues Ivor Lewis, the chief operating officer of TSSI Systems. As data becomes more and more centralised, increasingly relying on storage and access facilities such as data centres, the subject of effective physical security has become as important as that of logical…. Read More