Specialist Security Blog

A blog providing opinion, advice and research surrounding specialist information, security threats and challenges from 7Safe's technical experts.

  • IoT WiFi Kettle

    Securing IoT Devices by Design: the Roadmap that avoids Assumptions

    Apr 17, 2018

    David Alexander of PA Consulting highlights a few dangerous assumptions in most IoT Roadmaps.
  • Trojan

    CYBER BITESIZE - Threat #2: Trojans

    Apr 12, 2018

    In the second article in the series, CYBER BITESIZE, PA & 7Safe's Michael Shuff defines Trojans.
  • The information security blame game

    The Cyber Security Blame Game

    Apr 11, 2018

    Can organisations outsource responsibility for cyber breaches? PA & 7Safe cyber expert and PCI QSA, Stephen Hancock, says no.
  • Ransomware

    CYBER BITESIZE - Threat #1: Ransomware

    Apr 10, 2018

    In the first of a series of Cyber Bitsize articles, PA & 7Safe's Michael Shuff defines cyber threats and the risks they pose.
  • UK_Cybersecurity_Breaches_Report

    Is your business too complacent about cyber security?

    May 04, 2017

    The results are in. Britain’s businesses need to get better at protecting themselves from cyber criminals. The UK’s Department for Culture, Media and Sport’s annual Cyber Security Breaches Survey seeks to uncover business attitudes toward cyber security and the nature and impact of breaches. So what picture emerges when we focus on medium and large businesses?
  • Cyber Threat Hunting

    Cyber Threat Hunting

    Oct 25, 2016

    7Safe expert, Steven Shepherd MBE, advises on how to hunt for cyber threats.
  • imgres

    Apple file system to step into modern age – welcome APFS

    Jun 16, 2016

    The 13th June 2016 saw the 27th Apple World Wide Developer Conference (WWDC). As expected there were a multitude of new feature announcements to the Apple ...
  • Penetration tester at work

    PoSH SQL

    Feb 12, 2016

    Many pentesters struggle to integrate PowerShell + SQL into their engagements in a secure manner. 7Safe’s Owen Sheering shows how it should be done.
  • hacksight

    Zero-day protection

    Nov 13, 2015

    At 7Safe our experts are keen to share their latest learnings and findings. Will Hunt, one of our key Penetration Testers and Digital Forensics Consultants, has taken time to discover insecure service binary vulnerabilities in the software referenced below from three different vendors..
  • Android Robot sleeping

    Stagefright: 99% of Android phones vulnerable while "owner is asleep"

    Jul 31, 2015

    A serious vulnerability has recently been discovered, by Joshua J. Drake Vice President of platform research and exploitation at Zimperium zLabs, in Android that could allow malware hidden inside a modified media file to be sent via MMS to your device knowing only your phone number.
Previous Page
Next Page