Home is where the hack is?
Smart products, such as doorbells, wireless cameras and alarms, have been increasingly popular purchases for consumers in recent years. The products can bring a range of efficiencies into the home, but a recent investigation from independent UK consumer body, Which?, shows that they could also present security and privacy risks.
“We wait, because we know you” Inside the Ransomware negotiation economics
Still a significant percentage of ransomware-affected businesses see no other option than to negotiate and pay a ransom. But not much is known about the economic backgrounds of digital extortion and the negotiation strategies. Here we investigate negotiations that take place after it’s been decided to pay a ransom.
Graff search: How attackers track online footprints
We take a look at the recent cyber-heist at multinational jeweller, Graff and how individuals can take action to stay safe online.
SnapMC: extortion without ransomware
Over the past few months NCC Group has observed an increasing number of data breach extortion cases, where the attacker steals data and threatens to publish said data online if the victim decides not to pay.
Managing Consultant and Incident Handler Mattijs Dijkstra, who is based in our Delft office in The Netherlands, shares his thoughts in this piece.
Forget ransomware, too expensive a
Securing a growing industry: spotlight on crypto security
In this blog post, we explore cyber security in cryptocurrency following cyber attacks that have cast doubt on the security of the market at a pivotal point in its growth.
Are vaccine passports giving a free pass to COVID-19 rule breakers?
We’ve been researching digital vaccine credential systems to gauge the extent to which user privacy is affected, and the degree of trust that users should place on these systems.
GPS S.O.S: Making GPS technology safer
GPS tracking is now a part of our daily life - in our smartwatches, smartphones, pet trackers, vehicles satellite navigation and more. But what are the risks? Anna Reedman, security consultant, explores this.
Are dash cam users en-route to security risks?
We rely on dash cams to continuously record events that happen on the road, and to provide evidence in the event of road traffic incidents or accidents. But can we trust them to keep our data safe and secure? In our latest research with Which?, we put nine devices to the test and uncovered a number of issues.
Spotlight on the Monetary Authority of Singapore’s Technology Risk Management Guidelines
As part of our ‘Spotlight on’ series, we have been delving into the topic of operational resilience and third-party risk management within financial institutions. In this installment, Simon Fieldhouse, global managing director – Software Resilience, offers his insight into the latest version of the Monetary Authority of Singapore’s Technology Risk Management (TRM) guidelines.
So you want to work in cyber security?
There are many different types of jobs in cyber security. In this blog, Sourya Biswas, Technical Director here at NCC Group, gives some pointers for the different areas people may want to consider when thinking of a career in cyber security.
Digital Operational Resilience Act (DORA) – 5 key challenges to prepare for
The EU’s Digital Operational Resilience Act (DORA) is expected to come into effect in 2023. DORA aims to simplify and update the rules on ICT risk management in the face of rapid technology adoption. Here we take a look at the key challenges organisations will face in order to comply.