Secure Website Lock Icon to Be Removed From Chrome

Google recently announced that the lock icon that is used to indicate that the website connection is using https will be removed from the Chrome browser. They said that it is no longer needed as more than 99% of all web pages loaded on Chrome are over HTTPS. They also...

MacOS Targeted by Malware

The macOS was once thought to be a highly secured operating system. We’re starting to see more malware designed specifically to target macs. Once such example is the new MacOS information stealing malware named Atomic. The malware is designed to steal keychain...

Top 5 Most Dangerous New Cyberattacks for 2023

Experts from SANS have shared at RSA Conference what are the most dangerous forms of cyberattacks for 2023. The first is SEO-boosted attacks where attackers use SEO to boost the rankings of their malware-laden sites in order to send more victims their way. Next is...

Is End to End Encryption Good or Bad?

Is End to End Encryption Good or Bad? There was the recent event where the new synchronisation feature to Google Authenticator was criticised by security researchers as not secure for use due to its lack of end to end encryption. Google responded the very next day...

Enable GitHub Private Vulnerability Reporting at Scale

GitHub recently announced that private vulnerability reporting is now generally available for enabling at scale. This functionality provides a way for security researchers to privately disclose security issues to the project’s maintainers without the risk of...

TAFE South Australia Suffers Data Breach

TAFE South Australia has revealed that it has suffered a data breach. 2,224 student identification records were impacted. The identification forms include driver’s licenses and passports used for enrolments prior to 2021. The organisation were first notified of...

Unmaintained WordPress Plugin Used to Compromise Website

Attackers are using the abandoned WordPress plugin, Eval PHP, to compromised websites by injecting stealthy backdoors. Eval PHP is an old legitimate WordPress plugin that allows site admins to embed executable PHP code on their website pages and posts. The plugin has...

5 Steps for Securing Your Software Supply Chain

RSA Conference just published an article that I’ve written on the 5 steps for securing your software supply chain. Most modern applications are assembled from open source components with developers typically writing less than 15% of the code for their...