A recent news report about a travel services company who has been fined £150,000 by the Information Commissioner's Office for a breach of an 'internal' system, hosted on the same server as their main e-commerce website (that lead to the compromise of over 1.1 million credit/debit card details) has driven me to write this post, […]
In light of the recent news reports of the take over of the Command and Control servers for the Gameover Zeus botnet - and the potential resurgence of CryptoLocker. I thought it may be a good idea to publish this case study about just how devastating it can be if you find yourself a victim […]
eBay announced on Wednesday 21st May 2014 that they had suffered a significant breach of their user details database, which resulted in the personal details and hashed passwords of eBay users being compromised. It has since been revealed that the breach occurred between February and March 2014.
Like it or not, the so called Internet of Things is here, and it's only just beginning. You can now buy Internet-connected versions of many major household appliances including your kettle, refrigerator, smoke alarm, thermostat and (if you've got the money to spare) systems for controlling your entire house.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.