This article by Oli Buckley, Professor of Cyber Security at the University of East Anglia and Jason Nurse, Associate Professor in Cyber Security at the University of Kent takes a balanced look at how AI is starting to help threat actors create more believable attacks. Cybercriminals are creating their own …
Is Bluetooth broken?
Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …
How to Bypass Windows Hello
Cyber security researchers by their very nature are always prodding and poking at systems to see what they can break. This time Jesse D’Aguanno and Timo Teräs on behalf of Microsoft’s Offensive Research and Security Engineering (MORSE) have bypassed the Windows Hello (biometric) security systems on some of the most …
Researchers just cannot leave things alone!
No sooner do I write an article telling you all about the cyber security benefits of using a VPN when you have doubts about an internet connection, than a team of academics come along with a paper showing that a VPN can be compromised. My article: It’s holiday time again …
Continue reading “Researchers just cannot leave things alone!”