Month: February 2017

Comment on RSA Parties 2017 by Dave Lewis

Read full post It’s on the list. Thanks for sharing that David!

/ February 15, 2017

Proof-of-concept ransomware to poison the water supply

Read full post Researchers have described how ransomware could potentially attack industrial control systems (ICS), and demonstratied how new malware threats might target core infrastructure, holding entire cities hostage. The post Proof-of-concept ransomware to poison the water supply appeared first...

/ February 15, 2017

Proof-of-concept ransomware to poison the water supply

Read full post Researchers have described how ransomware could potentially attack industrial control systems (ICS), and demonstratied how new malware threats might target core infrastructure, holding entire cities hostage. The post Proof-of-concept ransomware to poison the water supply appeared first...

/ February 15, 2017

UK government to roll out cybersecurity clubs for teens to address skills shortage

Read full post A new government scheme will be rolled out to thousands of 14-18 year olds across the UK, encouraging them to take part in extracurricular cybersecurity clubs. The post UK government to roll out cybersecurity clubs for teens...

/ February 15, 2017

UK government to roll out cybersecurity clubs for teens to address skills shortage

Read full post A new government scheme will be rolled out to thousands of 14-18 year olds across the UK, encouraging them to take part in extracurricular cybersecurity clubs. The post UK government to roll out cybersecurity clubs for teens...

/ February 15, 2017

New Android trojan mimics user clicks to download dangerous malware

Read full post Android users are exposed to a new malicious app imitating Adobe Flash Player and serving as an entrance gate for potentially any kind of dangerous malware The post New Android trojan mimics user clicks to download dangerous...

/ February 14, 2017

New Android trojan mimics user clicks to download dangerous malware

Read full post Android users are exposed to a new malicious app imitating Adobe Flash Player and serving as an entrance gate for potentially any kind of dangerous malware The post New Android trojan mimics user clicks to download dangerous...

/ February 14, 2017

ILOVEYOU: The wrong kind of LoveLetter

Read full post A game with love: How the LoveLetter virus corrupted our tech by playing on our emotions. The post ILOVEYOU: The wrong kind of LoveLetter appeared first on WeLiveSecurity

/ February 14, 2017

ILOVEYOU: The wrong kind of LoveLetter

Read full post A game with love: How the LoveLetter virus corrupted our tech by playing on our emotions. The post ILOVEYOU: The wrong kind of LoveLetter appeared first on WeLiveSecurity

/ February 14, 2017

BH Consulting February 2017 Newsletter Now Online

Read full post   The latest edition of our newsletter is now online. Our SecurityWatch Newsletter gives you updates on what has been going on in BH Consulting, highlights some upcoming events, and focuses on some stories we think are of use...

/ February 14, 2017

Busy Weekend

Read full post News coverage can often be like waiting for a bus. You can go a long time when nothing really happens and then suddenly lots of them arrive together. This weekend was one of those occasions when BH...

/ February 13, 2017

Comment on RSA Parties 2017 by David

Read full post Can you add Shaves That Save? Wednesday at 6 PM, Moscone Center South, Gateway Ballroom / Viewing Room. No registration required, but requires any RSAC pass (Expo is fine!)https://www.stbaldricks.org/events/infosecshaves2017

/ February 13, 2017

It Could Happen to Anyone – A CEO Fraud Primer

Read full post There has been a lot of media coverage lately over various organisations falling victim to CEO fraud. Basically a scam whereby criminals using email fool a target within an organisation into redirecting funds into bank accounts under...

/ February 9, 2017

Deep Web, Dark Web, Darknet, Deepdeep, Darkdark…

Read full post   Deep web, Dark web, Darknet… These terms are often used interchangeably despite representing distinct, but related segments of the Internet. The deep web (sometimes called the ‘hidden’ or ‘invisible’ web) refers to pages and services on servers that...

/ February 7, 2017

Contract Risk Analyst Role Available

Read full post Due to our continued expansion and growth, BH Consulting have been engaged by a blue-chip client to recruit a Risk Assessment Analyst. The Risk Assessment Analyst is a strategically important role within this clients organisation with responsibility...

/ February 6, 2017

Welcome to the BH Consulting Team Stephen

Read full post We are delighted that our team at BH Consulting continues to grow and earlier this month we welcomed Stephen Rouine to the company. Stephen joins us as a Cloud and Cyber Risk specialist and will be working...

/ February 6, 2017