iPhones Aren’t Breach-Proof: Debunking the Myth of iOS Security While the iPhone has plenty of privacy-enhancing features, that doesn’t make it hack-proof. Hwei Oh Apr 02, 2025 Read Article Read
News in Brief: Patches from Apple fix privacy, code execution, lock screen bugs Lots of security holes fixed, but none of them reported as zero-days. Paul Ducklin Apr 01, 2025 Read Article Read
Where Traditional Mobile Security Falls Short Remote work and BYOD mean that organizational risk is no longer limited to the office. Hwei Oh Mar 20, 2025 Read Article Read
HIPAA Changes Ahead: What Healthcare Organizations Must Know New HIPAA regulations now demand adherence. Find out what’s required. Hwei Oh Mar 11, 2025 Read Article Read
End-to-end encryption: How it works, and why it breaks (Part 2 of 2) It’s rarely that the crypto gets cracked… it usually get sidestepped, or downgraded, or bodged. Paul Ducklin Feb 25, 2025 Read Article Read
Cybersecurity Isn’t Just Digital—Why Physical Security Matters Too Physical security measures should be part of your overall security strategy. Hwei Oh Feb 21, 2025 Read Article Read
End-to-end encryption: How it works, and why it breaks (Part 1 of 2) End-to-end encryption is everywhere, yet we still have breaches and eavesdropping. Why? Paul Ducklin Feb 20, 2025 Read Article Read
Firewalls under fire: Redoubts or beachheads? We know what you’re thinking. Should the word “beachhead” be “breachhead”? Paul Ducklin Feb 12, 2025 Read Article Read
What’s in a name? How attacks and attackers get their tags (Part 2 of 2) Why “Code Red”? What is “Salt Typhoon”? Does it matter? Paul Ducklin Feb 05, 2025 Read Article Read
What Modern Insider Threats Look Like We tend to focus so much on external cybersecurity threats that we forget about insiders. Hwei Oh Feb 05, 2025 Read Article Read
What’s in a name? How attacks and attackers get their tags (Part 1 of 2) “That which we call a rose/By any other name would smell as sweet.” But what about cyberthreats and cybercriminals? Paul Ducklin Jan 30, 2025 Read Article Read
Lessons from 2024’s Most Significant Cyberattacks Cyberattacks in 2024 confirmed many of the predicted cybersecurity trends. The year also highlighted new risk vectors due to AI and more sophisticated attack methods. Hwei Oh Jan 28, 2025 Read Article Read
Scams in the spotlight: Is it ‘Pig Butchering’ or ‘Romance Baiting’? In truth, the term “investment scam” is probably the clearest and most useful name. Paul Ducklin Jan 22, 2025 Read Article Read
Tales from the SOC: The illness of excess | S1 Ep008 There’s an ever-increasing cost in collecting more and more data just in case. So why do it? Paul Ducklin Jan 15, 2025 Read Article Read