Category Archives: General

Horizon Scanning: Hacktivism

Published:

Our historical understanding of protest as a means of political upheaval tends to be rooted in the idea of direct conflict between two clearly defined agendas or ideologies – between grassroots activism and state apparatus, for instance. We imagine crowds marching and holding placards, voicing their dissent in unison.

However, as we become increasingly interconnected and conduct more of our lives online, technology is changing our conceptions of protest and direct action altogether.

Continue reading

Friends or foes? Sino-American relations in Cyberspace

Published:

It may seem to some that China and America are experiencing a rapprochement of sorts in the cyber realm. Compared to previous years, today there are are markedly fewer headlines about breaches of American public and private institutions by the hands of Chinese hackers. Overall, there are fewer indictments being thrown at members of the People’s Liberation Army (PLA) and the level of political and economic sanctions being prepared against Chinese organisations and individuals has fallen since 2014/2015.

Continue reading

The Stacked Vulnerabilities Behind Mega-breaches

Published:

On the 23rd October 2015, it became public knowledge that 156,959 TalkTalk customers had their personal data exposed due to the insecure retention of customer records.

The breach dealt a major reputational blow to the telecommunications provider, and for many, the company has joined a growing list of brands that are now synonymous with a major breach of personal data.

Continue reading

Event: UK-NL Cyber Security Showcase 2017

Published:

Reserve your complimentary seat

Securty Alliance is exhibiting and presenting at the second edition of the annual UK-NL Cyber Security Showcase.

The event has been organised by a partnership between the British Embassy, the Department for International Trade, and The Hague Cyber Security Week. It will bring together 45 of the most innovative UK & NL-based cyber security companies to showcase their knowledge, products and services.

Continue reading

The dark reality of cyberspace: the case of CVE-2017-0199

Published:

Threat actors do not exist in a cyber vacuum. Hackers, organised criminal gangs, and nation states all operate within the same cyberspace and have access to the same systems and vulnerabilities. Whilst the tactics, techniques and procedures (TTPs) vary between different threat actor categories (in  terms of method, capability and sophistication), the infection vectors they target remain the same.

Continue reading

Election Hacking: an old threat in new clothes

Published:

There is a general consensus that Russia interfered in the 2016 US Presidential Elections. According to the US intelligence community, it has been assessed with ‘high confidence’ that Russia used nation state proxy groups to influence the outcome of the presidential election in favour of Donald Trump.

Continue reading

Video: SANS Cyber Threat Intelligence Summit 2017

Published:

The SANS Cyber Threat Intelligence Summit 2017 was held in Arlington Virginia on January 31, 2017 and February 1, 2017.

Watch Rob Dartnall, Cyber Intelligence Director at Security Alliance present : The Use of conventional intelligence methodologies in Cyber Threat Intelligence

Continue reading
Riffle Project

The Riffle Project

Published:

Online anonymity has become very popular with users becoming concerned about their privacy when using the Internet. TOR is one of the most widely used (and arguably, most effective) ways of maintaining a level of online anonymity. Although TOR has some great advantages, it nevertheless has its limitations.

One possible alternative to TOR is the Riffle anonymity network. But how does it the answer to the call for better online privacy?

Continue reading