Planning for server reliability

Server reliability is of primary importance in our networked world. Billions of dollars in e-commerce is utterly dependent on reliable servers and reliable networks connecting those servers to users.

The Australian stock exchange (ASX) recently had a bad day when their trading system failed. Market opening was delayed by 90 minutes, and after experiencing problems during trading, they were […]

Read More
By |October 1st, 2016
Blogs, Discussion|Comments Off on Planning for server reliability

The danger of legacy protocols


Legacy server protocols can be dangerous, particularly those which were once widely used and are no longer well known. Why do these legacy protocols present a danger? Because people forget they exist – and younger IT workers may never have encountered them.

This issue was recently highlighted in an interesting blog post about the telnet protocol. Telnet, created […]

Read More
By |September 13th, 2016
Blogs, Discussion|Comments Off on The danger of legacy protocols

Privacy concerns with Australian census

There are serious privacy concerns with the forthcoming Australian census.

The Australian Census is Australia’s biggest survey. Conducted every five years by the Australian Bureau of Statistics (ABS), it asks a range of questions of all 10 million households and 24 million people. The results are intended to guide government policy over the next few years.

Unfortunately, there’s been some […]

Read More
By |August 6th, 2016
Blogs, Discussion, Security|Comments Off on Privacy concerns with Australian census

Brexit and IT security

There are many uncertainties regarding the UK’s recent referendum vote to leave the EU. Only time will tell if the benefits of “taking back control” will outweigh the short term costs.  But this isn’t a political blog, and so we won’t be discussing the wider implications of leaving the EU. Here, we’re interested in […]

Read More
By |July 5th, 2016
Blogs, Discussion, Security|Comments Off on Brexit and IT security

Massive account takeover attacks

The massive account takeover attacks reported by Akamai recently illustrate what corporations are up against when it comes to cyberattacks.

Account takeover attacks are when cyber-attackers obtain credentials from a stolen password dump or through a SQL injection attack. They then try to validate the usernames and passwords that have been stolen by logging into […]

Read More
By |June 24th, 2016
Blogs, CompleteFTP, Discussion|Comments Off on Massive account takeover attacks

Operational technology security and the Internet of Things

One aspect not discussed in our recent post on security issues and the Internet of Things (IoT) is the increasing trend of connecting operational technology systems to the internet. This leads us to the vitally important issue of operational technology security.

Operational Technology (OT) refers to hardware and software that monitors and controls physical devices, processes and […]

Read More
By |June 16th, 2016
Blogs, Discussion|Comments Off on Operational technology security and the Internet of Things

Ransomware again

We only just discussed the growing threat of ransomware – cyberattacks where victims’ data is encrypted by attackers and they must pay a fee to have their data decrypted.

The University of Calgary confirmed this week that it has been forced to pay $20,000 in bitcoins to decrypt its email server and other files after a ransomware attack. Apparently, decryption […]

Read More
By |June 11th, 2016
Blogs, Discussion, Hacking|Comments Off on Ransomware again

The growing threat of ransomware

What is ransomware?
Ransomware is a real and growing threat. Although it has been around for many years, it is only more recently that ransomware has become more prominent. The release and rapid spread of the ransomware program Cryptolocker in 2013 was primarily responsible, although there are now a variety of imitators.

What is ransomware? As the name suggests, […]

Read More
By |June 3rd, 2016
Discussion|Comments Off on The growing threat of ransomware

Vehicle hacking is here

You might remember the infamous Jeep hack last year, in 2015. In a scary demonstration, Charlie Miller and Chris Valasek demonstrated their ability to remotely control almost everything, including steering and braking. They could even kill the Jeep’s engine. The hack was done 10 miles from the car – and could have been performed from up […]

Read More
By |May 7th, 2016
Blogs, Discussion|Comments Off on Vehicle hacking is here

Short URLs expose cloud security holes

Cloud security
We’ve discussed some of the issues associated with cloud security previously. Many companies store confidential documents in the cloud, often unknown to companies themselves. Individuals simply use cloud-based services for collaboration because they are convenient.

Recently, a new security issue for cloud-based services has been flagged, this time to do with short URLs.
What are […]

Read More
By |April 22nd, 2016
Blogs, Discussion|Comments Off on Short URLs expose cloud security holes