Search Results: CBR Rolling Blog
1-15 of 59 results

Stop using passwords that are hard to remember but easy for computers to guess

A long string of memorable words is much more secure than a short set of random characters.


Published 16 April 2014

How does the Heartbleed bug work?

A visual guide to the Heartbleed threat.


Published 11 April 2014

Watch out for leprechaun viruses on St Patrick's Day

There is a history of viruses linked to the holiday.


Published 17 March 2014

The Russians are coming

Russian-language cybercrime community utilising internal currencies.


Published 17 February 2014

Please don't chop off my fingers

The story of my digital digits.


Published 27 January 2014

SPOILER: Ever wondered what all the computer coding means in films?

The code in Iron Man’s visor is actually for a Lego computer.


Published 14 January 2014

Guest Blog: Trapping malware in the sandbox

Threat emulation is a key new technique forpreventing zero-day and targeted attacks. Tom Davison of Check Point explains how this method delivers...


Published 20 December 2013

UK consumers putting mobile data at risk

Shoppers have no security installed on their mobile device.


Published 19 December 2013

Adobe still hasn't alerted me to security breach

Comforting that other companies have stepped in.


Published 28 November 2013

Ransomware and science fiction

A new virus is the latest example of real life copying fiction.


Published 22 November 2013

All fingers and thumbs

With the aid of biometrics, Duncan MacRae’s fingers can help him gain access to a host of nations and buildings.


Published 07 November 2013

Adobe passwords revealed

Are you amongst the clever folk who used 123456?


Published 06 November 2013

Guest blog: User and App centric security

Nick Bowman, F5 Networks, on the new set of challenges in the security landscape.


Published 05 November 2013

Afternoon infographic: PRISM is only a symptom

The causes of data breaches are shifting.


Published 01 November 2013

Halloween infographic

Spooky security statistics from Rapid7


Published 30 October 2013

1-15 of 59 results
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.