Past The Password Book

In the recent time off from pen-testing and sneaking into places, I got the chance to watch a short behind the scenes glimpse at the engineering that formed the James Web Telescope. The 30 min video shows just how far …

Being Viewed On BlackVue

Today I have been looking at the BlackVue Cloud portal of horrors. BlackVue manufacture smart dash cams, some of their models enable remote access and have LTE data capability. What this means is that you can install the camera in …

World’s Worst Phishing Campaign

When considering a simulated phishing campaign, security vendors are keen to put their best foot forward. I can’t blame them because that’s how sales and marketing work. You wouldn’t want a BMW if it wasn’t “The ultimate driving machine” would …

Online Crime is Real Crime – Part 2

In part one of this blog, I talked about our journey here. It explains why I am so hopelessly fucked off with the current state of affairs and details my relationship with Policing. I’m not some confused yuppie, I’m not …

Online Crime is Real Crime – Part 1

When we look at online crime, we think of it as a problem that is impossible to solve. We’ve mostly just accepted the defeat. If only we could do something we cry, “if only the challenge wasn’t so big and …

The Solution To Identity Fraud

I really respect readers of our blog, hopefully you’ve come here to shoot down the claim in the title. I know I would if I saw it randomly on Twitter. I would drive to that persons house and argue why it …

The UKCSC

When tasked with naming the UK Cyber Security Council – the newly minted crack cyber council from the government. It seems some blindingly obvious errors were overlooked by the committee. The first, which is simply inexcusable after the lengthy planning …

Explain The Humans

The Explain The Humans series takes a look at common components of psychology and makes sure your security awareness program is aligned with the way real people work, learn and interact. The series will be heavily supported by the expertise …

Trust in SMS

Before we get into this blog, can we please just take a second to fondly remember the fallen… for many of us the source of this modern world we now feel so familiar with. You might not remember the the …

Those Who Cannot Remember The Past

Information security is a fast paced industry. Everyday, people are dropping exciting projects on GitHub, data breaches keep journalists in work, universities teach the next generation of practitioners and security companies churn out invoices. It’s all frenetic, it’s a turbo …

Pyrotechnic Pretexts

We recently saw a video posted by the London Fire Brigade on Twitter and it got us thinking. I’m sure followers of the blog know just what we thought already… It’s probably best to rate the London Fire Brigade on …

Guest Blog: Ed Tucker

In this guest blog we speak to Ed Tucker (@teddybreath). There is more to this dark horse than CISO of the year and I reckon he has a few tips up his sleeve for organisations. Let’s give him a shake …

How Low Will They Go?

True to form, cybercriminals are out in force trying to exploit the recent COVID issue. According to Action-Fraud, they have already netted close to £970,000 from UK victims. Source: Why use COVID-19 in scams? In phishing simulations, we see a …

Turned Off By Ofcom

In July 2019, Ofcom introduced a new way to handle number portability for UK customers. The idea was a simple one, make it possible for people to text ‘PAC’ to 65075 and within seconds a SIM porting request is in …