Welcome to the new security blog, a group effort from the analyst security team at Bloor.
An interesting story from the BBC based on some research I have been doing with Nico Prucha based at the University of Vienna. We found jihadists...
Join me at the Counter Terrorism Expo to be held in London on the 19th and 20th of April 2011.
DDoS attacks are increasing in size and sophistication and are increasingly targeted at organisations of all sizes. Cloud-based DDoS mitigation...
Life is moving fast in the world of mobile device security. With announcements this week at Mobile World Conference of ever more powerful smartphones...
Web-based threats are growing rapidly, but not all organisations have effective controls in place for web security, or even any at all. However, new...
With today's sophisticated and complex malware threats, only a proactive security stance is acceptable.
This is an interesting paper. It introduces some work called Soundminer, a stealthy and context-aware sound Trojan for smartphones. It explores the...
Today's threat landscape is complex. Hackers no longer lust for fame, rather looking for ways to make their fortune. Simple exploits, such as a...
At long last more people are realising that 2011 is quickly becoming the tipping point for mobile security issues, as reported here. This is an area...