Davey Winder

delivering award-winning technology journalism since 1991

  • About
  • Contact me

News

policeman pursuing criminal with @ symbol blocking path
News 

Security industry reacts to UK police cyber-crime budget revelations

March 24, 2018March 24, 2018 Davey Winder 444 Views 0 Comments Analysis, crime, industry, police, spending

UK police forces are revealed to have spent a measly £1.3 million on cyber-crime training in the last three years.

Read more
Hand holding smartphone running Uber app
Breach News Opinion 

Uber data breach cover-up: security pros speak out

November 23, 2017November 23, 2017 Davey Winder 1506 Views 0 Comments breach, disclosure, Reputation, Response, Uber

Industry responds as Uber suffers 57 million record breach, then pays hush-money to prevent disclosure to customers in shocking cover-up.

Read more
Iranian flag
News 

DUMB ransomware attacks Iranian targets via compromised VPN

October 27, 2017 Davey Winder 850 Views 0 Comments Iran, ransomware, threat intelligence, VPN

Tyrant ransomware threat is being distributed in the country via a compromised VPN app, totally undermining trust in IT departments

Read more
NetEvents17 awards logo
News 

IT Security Thing chooses cybersecurity winners at NetEvents Global awards

October 5, 2017October 5, 2017 Davey Winder 915 Views 0 Comments ITST, NetEvents, News

IT Security Thing was asked to be one of the judges for the IoT, Cloud & Cybersecurity Innovation Awards 2017.

Read more
statues listening at wall
News 

Researchers pwn Alexa, turning Amazon Echo into covert listening device

August 1, 2017August 1, 2017 Davey Winder 341 Views 0 Comments Amazon, Echo, Hacking, pwn

A vulnerability in the Amazon Echo device can be exploited to turn it into a covert spying tool, say researchers.

Read more
Photo of some memory chips
News 

Enterprises CAN defend against new wave of anti-forensic cyber-attacks

February 10, 2017February 10, 2017 Davey Winder 342 Views 0 Comments APT, Defence, Enterprise, Kaspersky, Malware

Researchers agree that the trend of fileless malware attacks is increasing, so how easy is it to spot and identify?

Read more
Photo of a black rat
News 

Cyber-criminals can rat on rippers using new reputation service

January 29, 2017January 29, 2017 Davey Winder 613 Views 0 Comments Analysis, crime, cyber-crime, dark market, Reputation

A special investigation by threat intelligence specialists Digital Shadows has uncovered the existence of a reputational “Rat-as-a-Service” site called Ripper.cc

Read more
Image of Donald Trump against background of words about him
News 

Giuliani (still) Down!

January 15, 2017January 15, 2017 Davey Winder 813 Views 0 Comments Down, Giuliani, Politics, Trump, Web

The Giuliani Security website is still down, 48 hours after Donald Trump announced Rudy Giuliani will be his cybersecurity advisor

Read more
Lots of keys
News 

Project Wycheproof shines light onto dark art of open source crypto

December 23, 2016December 23, 2016 Davey Winder 481 Views 0 Comments Analysis, cryptography, Encryption, Google, security

Google has released Project Wycheproof, which aims to make checking for vulnerabilities easier by checking cryptographic libraries for known weaknesses

Read more
  • ← Previous
Lazy hackers employ gruntbots to quickly breach network defences
Threat Intelligence 

Lazy hackers employ gruntbots to quickly breach network defences

April 20, 2018 Davey Winder 0
Candy bar security posture leaves enterprises soft on the inside
Hacking 

Candy bar security posture leaves enterprises soft on the inside

April 14, 2018 Davey Winder 0
Reputation rebuilding on cybersecurity is key for the NHS
Analysis 

Reputation rebuilding on cybersecurity is key for the NHS

April 11, 2018 Davey Winder 0
ICANN struggles to make WHOIS GDPR compliant without increasing cyber-crime
Analysis 

ICANN struggles to make WHOIS GDPR compliant without increasing cyber-crime

April 6, 2018 Davey Winder 0
Common-sense GoScanSSH author avoids infecting high-risk targets
Threat Intelligence 

Common-sense GoScanSSH author avoids infecting high-risk targets

March 30, 2018 Davey Winder 0

Categories

Post Archive

Click below to read the ‘Mitigating Cybercrime Through Meaningful Measurement Methodologies’ paper by Davey Winder and Ian Trump

Mitigating CybercrimeThrough Meaningful Measurement Methodologies cover image

Tags

Advice AI Analysis Android Apple authentication breach Business crime Cybercrime cybersecurity DDoS Encryption Enterprise finance future Google Government Hacking Health healthcare industry IoT Malware Microsoft mobile News NHS Opinion passwords Phishing Politics Privacy ransomware report Research security Smartphone threat intelligence Threatscape vulnerabilities Vulnerability WannaCrypt0r Web WordPress
  • Popular
  • Recent
  • Comment
Smart gun broken by smarter hacker with a magnet

Smart gun broken by smarter hacker with a magnet

August 10, 2017 Davey Winder 6 Comments
Smart guns could cut US deaths

Smart guns could cut US deaths

November 16, 2017 Davey Winder 6 Comments
Virtual Kidnapping: when social engineering gets really nasty

Virtual Kidnapping: when social engineering gets really nasty

October 16, 2017 Davey Winder 5 Comments
Ransomware actors turn attention to holding websites hostage

Ransomware actors turn attention to holding websites hostage

August 18, 2017 Davey Winder 4 Comments
Equifucked: Legal clauses, stock sales and 143 million breached accounts leave Equifax’s reputation in tatters

Equifucked: Legal clauses, stock sales and 143 million breached accounts leave Equifax’s reputation in tatters

September 11, 2017 Davey Winder 4 Comments
Amber Rudd knows nothing about encryption, says Amber Rudd

Amber Rudd knows nothing about encryption, says Amber Rudd

October 9, 2017 Davey Winder 4 Comments
Lazy hackers employ gruntbots to quickly breach network defences

Lazy hackers employ gruntbots to quickly breach network defences

April 20, 2018 Davey Winder
Candy bar security posture leaves enterprises soft on the inside

Candy bar security posture leaves enterprises soft on the inside

April 14, 2018 Davey Winder
Reputation rebuilding on cybersecurity is key for the NHS

Reputation rebuilding on cybersecurity is key for the NHS

April 11, 2018 Davey Winder
ICANN struggles to make WHOIS GDPR compliant without increasing cyber-crime

ICANN struggles to make WHOIS GDPR compliant without increasing cyber-crime

April 6, 2018 Davey Winder
Common-sense GoScanSSH author avoids infecting high-risk targets

Common-sense GoScanSSH author avoids infecting high-risk targets

March 30, 2018 Davey Winder
What CFOs need to know about cyberscams

What CFOs need to know about cyberscams

March 27, 2018 Davey Winder
  • Davey Winder says:

    AI, or more correctly ML, certainly has a role to ...

  • Terry Griffiths says:

    Isn't dealing with these false positives where AI ...

  • Mac Brandon says:

    Can you explain in laymans terms why it is so diff...

  • Davey Winder says:

    A shorter threat window would be great but is easi...

  • Davey Winder says:

    Sadly, I cannot accept the credit for coming up wi...

  • Mac Brandon says:

    Why does this not surprise me as much as the size ...

  • Privacy Policy
    Copyright © [2018] Freelance Word Punk. All rights reserved.