Two of the biggest stories in cyber security in 2017 were the discovery of critical flaws in the security of two widely used technologies.  In September researchers disclosed the discovery of Bluebourne, a Bluetooth based attack vector which makes it possible to steal data from almost any Bluetooth enabled device.  In October, the announcement that…

Read More

For a cybersecurity perspective, today’s dominant mobile operating systems have considerable advantages over legacy desktop systems.  Application isolation means that applications are restricted from interfering with the behavior or data of other applications and have highly restricted access to underlying system functions.  The app store software distribution model means that by default applications and their…

Read More

On Saturday night, the Mayweather McGregor bout is expected to gross $500M plus on pay-per-view alone. That would put in the same league as the all time top ten grossing movies in the US. Hence they’re calling it the ‘money fight’. Using the word ‘fight’ is stretching it a bit given only one of them…

Read More

A Patchwork of Complexity Last week the globe was still reeling following the WannaCry ransomware attack. The malware wreaked havoc on computer systems around the world, locked data from users and crippled services. Reports citing its impact on patient care at NHS hospitals humanized the story in a way that cyber security attacks seldom do. Since…

Read More

Huge mobile phone bills while travelling in the EU will soon be a thing of the past. End of EU roaming charges Four years after the EU’s proposal for a single telecoms market, roaming surcharges on calls, texts and data usage for your mobile phone will come to end on 15 June 2017. And although…

Read More