Author Archives: peter

PassW0rds the barrier and the way into your organisation.

Password Security Passwords, normally in conjunction with a User identity (userid), have been in use for as long as we have had access to computers. While they are far from a perfect system of providing a unique identification for access to resources and ...

The CSRI’s business guide to urgent cyber security issues and how to secure yourself in the information age.

One of the UK’s leading cyber security experts Professor Andrew Jones, author of ‘Global Information Warfare: The new digital battlefield,’ has developed a number of simple and easy to understand articles on computer security for the CSRI.  ...

McAfee Report – Operation Shady Rat.

A McAfee report on  its investigation into APT attacks written in the first person by Dmitri Alperovitch, Vice President, Threat Research, McAfee:   An investigation of targeted intrusions into more than 70 global companies, governments, and non-pr ...

‘Phone hacking’ why everyone’s to blame.

The outrage over the illegal accessing of mobile phone messages in the UK has failed to expose the full list of those to blame in the scandal. Revelations about the practice of remotely listening to other people’s voice messages – erroneously labelled ...