Cyber-attacks: small business – big threat

Cyber-attacks and hacking are rarely out of the news these days. In the last week alone there have been lurid headlines about damaging DDoS cyber-attacks on popular online notes and web clippings service ,Evernote, social media dashboard application, TweetDeck, and news site, Feedly, affecting millions of users. Cyber-attacks, however, are not the exclusive preserve of …

Read More

Security vulnerabilities in SEO plugin leave millions of WordPress users at risk

Whilst WordPress might be one of the most popular global content management systems, it is also one of the most vulnerable and targeted CMS platforms. The reason for this is simple: its popularity and reach make it extremely attractive to cyber-breach by attackers determined to exploit and compromise flaws in both outdated software and vulnerable …

Read More

Lunch with a Pen Tester

Web Security Lunch and Learn Event with KRYPSYS and Partners Attend this free-of-charge lunch and learn event with Krypsys and Pertners at prestigious locations in London and Manchester. Get the attackers perspective on web site and web application secuirty from a senior penetration tester and security engineer with more than 15 years experience. Request a place on this …

Read More

Cyber security: ‘resilience’ is the key to thwarting cyber-attacks

Can any business ever defend against every potential cyber-attack or protect its networks from hackers? The short answer to that is no. Determined hackers are enterprising and surprisingly skilled at finding even the smallest chink in your business’ security network. So does that mean you shouldn’t bother with security at all? Well, no: on the …

Read More

Cyber-crime: Cisco claims retailers remain one step behind hackers

What lessons have we learned from last year’s massive cyber-attack on Target where hackers seized the personal and bank card information of more than 110 million customers? Well, according to Cisco Systems, the global networking and technology giant, the answer is not a lot. Yes there has been a scramble to come up with some …

Read More

New study shows that most SMEs mistakenly believe they are immune from cyber-attack

Do owners of small and medium-sized business ever considered the fact that they may at some stage face the prospect of cyber-attack? The chances are the answer to that question is no. The reason for this is that they feel they are not big enough, or important enough to warrant attention from hackers; after all, …

Read More

Cyber-defence: insurance is no substitute for security claim insurance underwriters

The UK’s leading energy companies have taken a battering over recent months, not just from the elements, but also from the insurance companies they have previously relied upon. It isn’t the high level of claims that are causing sleepless nights for insurance underwriters however: it’s the industry’s weak cyber-defences. Leading underwriting firms have expressed deep …

Read More

Cyber-attacks: someone’s got a big new cannon claims Cloudfare’s chief executive

How seriously should governments and businesses take the threat of cyber- attack? Well, in the view of Matthew Price, chief executive of online security experts, Cloudfare, the answer is very seriously indeed. On his social media account he highlighted the scale of the problem by tweeting: “Someone’s got big new cannon – start of ugly …

Read More

NatWest online services hit by cyber-attack

If ever proof were needed that hacking is still an ongoing and persistent threat and that every business needs to beef up its defences against cyber-attack, then the experiences of Royal Bank of Scotland Group should serve as a salutary lesson for every organisation. Already unpopular for numerous well-documented reasons, RBS and Nat West took …

Read More

Payment Processor Hacking – 1,295 Bitcoins Stolen

BIPS, based in Copenhagen, one of Europe’s largest bitcoin payment processors, was breached last week. 1,295 bitcoins, worth around $1,000,000, were stolen. It is believed that a two-stage attack was employed – DDoS followed by hack – was employed. BIPS primary service is to allow merchants to take payment in bitcoins, and then exchange them …

Read More

Cyber-attacks are becoming increasingly costly: can your business really afford not to protect against itself against such attacks?

Have you ever wondered why network security testing is so vital? Maybe you think that having already spent a considerable sum on security precautions to prevent hacking, the cost of additional vulnerability assessments and penetration testing is a step too far. Whilst Krypsys’ security experts understand such concerns, we still believe that it always pays …

Read More

Adobe hacking: customer credit card details and Adobe source code stolen

Adobe is the latest big name to have been hacked. According to the company source code for numerous Adobe products including Acrobat and ColdFusion has been stolen, customer IDs and passwords have been accessed and card details for 2.9 million customers stolen in a sophisticated cyber-attack on its website. The breach was initially carried out …

Read More

Sony and hacking: proof that once bitten doesn’t necessarily mean twice shy

Sony issued a public apology to “Grand Theft Auto 5” developer Rockstar Games and to fans of the blockbuster video game franchise last weekend after copies of the game that were downloaded from the EU PlayStation Store were prematurely opened by hackers. Whilst the hackers were not able to get the entire game up and running, they did manage to extract critical audio and video files containing details about the “Grand Theft Auto 5” storyline and soundtrack. Naturally “GTA” fans were shocked to see details about the highly anticipated “Grand Theft Auto 5” begin to trickle across gaming forums late last week, especially those who had pre-ordered the game which is due for official release on September 17 on Xbox 360 and PlayStation 3.

Read More

Penetration testing: BBC demonstrates hackers can access web-cams

Hackers can actually look at you through your web-cam and listen to what’s going on in your workplace or even meetings. Are you aware of this? Penetration testing or “pen testing” is aimed at particularly identifying the points of reference where a hacker maybe accessing your infrastructure. A penetration test will start to identify with your systems weaknesses and omissions and using this information will penetrate deeper into your network to point the exact issues.

Read More