Back at the beginning of February, Kaspersky lab researchers have rocked the world of security with some exciting and scary findings. They found on a Russian scientist's computer, a cluster of spying programs developed by one of the most powerful and mysterious hacking groups called “the Equation group”.

Firmware attacks become a reality

Kaspersky lab blog tells the tale:

One sunny day in 2009, Grzegorz Brzęczyszczykiewicz (pseudonym, to protect the original victim's identity) embarked on a flight to the burgeoning city of Houston to attend a prestigious international scientific conference. As a leading scientist in his field, such trips were common for Grzegorz. Sometime later

Firmware attacks become a reality

Back at the beginning of February, Kaspersky lab researchers have rocked the world of security with some exciting and scary

It sounds painfully dull but taking a little time to consider your cyber-security can save you a lot of time, frustration and even money in the long term. The aim of a cyber-security audit is to consider what assests you have, the risks posed to them and make improvements to reduce those risks.

How to Audit your Cyber-Security

All your data has value

The first task is think of all the information stored on your computer and devices as an assest, as something real, that can be lost, damaged and of course stolen.

To begin your data audit you have to take stock of what

How to audit your cyber-security

It sounds painfully dull but taking a little time to consider your cyber-security can save you a lot of time

Meet Aaron Jon Schock. Till 3 days ago Schock was a United States Representative from Illinois's 18th congressional district, serving since 2009. He was also a member of the Republican Party, and was considered to be a rising star with a promising future. But now Schock’s political career is over. At least until the comeback.

Metadata Shock

Back in June 2013, Schock was one of the most vocal rep. criticizing Edward Snowdon leaks. When he was asked if Snowden had committed treason, Schock said, “That’s correct. He made an oath when he got clearance to get some of the most

Metadata Shock!

Meet Aaron Jon Schock. Till 3 days ago Schock was a United States Representative from Illinois's 18th congressional district, serving

Here is a short story about backdooring and weakening encryption on purpose and its results.

Golden Keys are

Back during the first “cryptowars” when Netscape was creating SSL (mainly to protect the early e-commerce market), the US still considered exporting strong crypto to be a crime. To deal with this, RSA offered “export grade encryption” that was deliberately weak (very, very weak) that could be used abroad. As security researcher Matthew Green explains in his blog, in order to deal with the fact that SSL-enabled websites had to deal with both strong crypto and weak “export grade” crypto, there was a system that

Golden Keys are (Not) for Everyone

Here is a short story about backdooring and weakening encryption on purpose and its results. Back during the first “cryptowars

Your system can get infected and you might not even realise as the sympothms might be a mundane nuisance rather than any noticeable harm. There are a lot of ways malware can infect your computer and sometimes the usual methods of protecting your computer aren't effective. However it happen here are 6 typical signs your computer is infected.

6 Signs that You've got Malware

1. Pop up Ads

Pop ups are a nuisance, most browsers have built in features to prevent them and there are numerous add-ons and other software to help avoid them. If you have constant pop ups, or notifications or if your browser

6 Signs that You've got Malware

Your system can get infected and you might not even realise as the sympothms might be a mundane nuisance rather