The Spectre of a Potential Security Meltdown
The Spectre of a Potential Security Meltdown

The Spectre of a Potential Security Meltdown

Spectre. Meltdown. These phrases sound like the titles of bad B-Movie action films. But they’re very much real. They’re the name of two massive CPU exploits that were uncovered over the past week (the first week of January 2018). Both are the biggest threats to processing hardware we’ve seen in a long time.

At their heart, both attacks take advantage of the fact that processors execute instructions speculatively. All modern processors perform speculative execution to a greater or lesser extent. They'll assume that, for example, a given condition will be true and execute instructions accordingly. If it later turns out that the condition was false, the speculatively executed instructions are discarded as if they had no effect.


Read more ...

2 Factor Authentication is a Life-Saver

2 Factor Authentication. You’ve probably heard of it.

It’s being rolled out more and more aggressively across all sorts of devices, and implemented in all kinds of software.

It’s basically a way of having 2 sets of doors to your sensitive information with different ways of opening them.

It’s vital as a safeguard to prevent malicious hackers from gaining access to your vital data even if they’ve breached other security controls you had in place, such as a password.

Time and time again we’ve seen examples of this saving business’s bacon and preventing much bigger data breaches from occurring.

Just this past week, A Dutch security firm fell victim to a well-executed attack that allowed hackers to take control of its servers, and intercept clients' login credentials and confidential data.

Read more ...

The Devil Is in the Detail

No doubt you’ve heard about these things called “ransomware attacks” which have appeared all over the news every now and again.

Just this summer, the NHS came under mass attack from ransomware called “WannaCry” that locked doctors and other staff out of their computers, demanding a payment to unlock their vital working information.

As usual, the government did its thing and recommended everyone kept their operating systems up to date and install strong anti-malware programmes to prevent such a crippling attack from happening again.

So. You’ve been responsible and followed these guidelines. That means you’re safe, right?

Read more ...

Security experts urge hoteliers to prep for EU’s GDPR

As cyber-crime continues to expand at an exponential rate, hotels have to comply with new, aggressive regulations such as the EU GDPR to make sure the massive amounts of data they hold is properly protected.

The law coming into place on the 25th May 2018 forces organisations to properly keep track of and protect their data according to the wishes of their employees, clients and best practice guidelines.

Read more ...

Reputation: The Phisher's Elixir

HTTPS certification. Anti-DDOS protections. CAPTCHA verification. All of these constantly evolving and expanding terms for protecting websites. It can get really frustrating having to keep up with the latest cyber-security techniques for your online services. Often an organisation’s website doesn’t collect any credentials, they don't have any payment info and in many cases, the site is simply a static representation of content that rarely changes.

Read more ...

Get in Touch

  • Phone
    0207 458 4088
  • Email
    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Address
    1 Canada Sq, Canary Wharf
    London, E14 5AB