Recent Publications


Research Results on SHA-1 Collisions February 24, 2017

 On Thursday, February 23rd, Google announced that a team of researchers from the CWI Institute in Amsterdam and Google have successfully demonstrated an attack on the SHA-1 hash algorithm by creating two files that hash to the same value.
Read More

CIA cyber-spying toolkit now in hands of hackers worldwide

 Amid a trove of documents released by WikiLeaks that allegedly contains “the entire hacking capacity of the CIA” is chilling evidence that everyday devices like smart TVs and cell phones have potentially become critical tools in the effort to spy on American citizens. 

Read More

8 Simple Ways to Keep Your Laptop Secure

 Most people don’t realize the potential of being affected by hackers and cyber risks when online which leads to the need for cybersecurity. The problem with cyber crime is that as a crime it’s severely underestimated, and many don’t even realize that there is a threat and completely disregard or ignore their safety online. 

Read More

Cyber security is no longer just about financial and reputational loss

 Cyber security is no longer about just financial and reputational loss, Tom Scholz, Research Vice President at Gartner, highlighted to Holyrood’s recent Cyber Security 2017 conference.“In conventional security our objectives is what we used to refer to as the CIA model: confidentiality, integrity and availability."In the digital business world, increasingly, we also have to start at the element of physical safety,” he said. 

Read More

Overcoming Security Challenges in the Hybrid Cloud

 Businesses are embracing the flexibility and scalability of hybrid cloud computing, where the public cloud and ancillary dedicated infrastructure converge. IDC predicts that by next year, 80 percent of organizations will be committed to hybrid cloud architectures. But many firms still struggle with cloud security management, with more than half citing security as their greatest challenge. Especially as internal departments outside of IT interact with these platforms, simple mistakes and security knowledge gaps can escalate into more serious issues. 

Read More

Anti-malware is imperfect but still necessary. Here’s why

 Researchers uncover vulnerabilities in security products on a regular basis. A recent example is Trend Micro, which faced scrutiny in January after researchers reported some 223 vulnerabilities across 11 of the vendor’s products. Tavis Ormandy, a prolific and gifted Google Project Zero researcher who most recently discovered Cloudbleed, regularly targets security products, including those produced by Sophos and such vendors as Kaspersky and Symantec. 

Read More