For military intelligence, the data revolution is only just beginning

militaire

In 2008, now ten years ago, in Georgia we were observing the first documented example of the use of “cyber” tools supporting the Russian Army’s air-land operations. The incident took place barely a year after the near-paralysis of Estonia following a cyberattack. Cyber has, since, fully entered the field of military actions by revolutionising the ways in which it can be used. Continue reading

How to Format Your Smartphone and Tablet Securely

smartphone

Formatting iPhones and iPads, as well as Android smartphones and tablets, in such a way as to make data recovery impossible is a simple and quick operation — thanks to the latest encryption tools.

When formatting the memory of a PC, a Mac, a smartphone or a tablet before selling it, the data is not completely erased. The software limits itself to making the disk “overwritable,” without proceeding with the physical removal of the data present. With the right programs, the next owner of the device could retrieve sensitive information. Continue reading

Digital carelessness? IT security is matter for the boss!

In the past two years, companies in Germany have suffered losses of €100 billion as a result of cybercrime attacks. This is the conclusion of a study by the Bitkom digital association.  Furthermore, in a brochure on cybercrime published in 2016, the Federal Criminal Police Office complained that “although companies invested more heavily in preparatory awareness-raising and training measures, a large number of the companies surveyed continue to find a high level of negligence (88 percent) and a lack of understanding of risk (77 percent) amongst their employees.” Continue reading

Cybersecurity: machine learning to be the main focus in 2018

In a landscape marked by an explosion in the number of security incidents, machine learning should be the main focal point in 2018. The promise of automated learning is of as much interest to hackers as it is to companies concerned with protecting their informational assets. The subject has even made it onto McAfee’s 2018 five most important trends in cyber security. Get the lowdown here. Continue reading

Cybersecurity: Five vulnerabilities you shouldn’t ignore

Recent news is confirming the extent to which 0-Day type security breaches and their associated protocols are naturally peaking interest. As critical as they are on a technical level, these vulnerabilities only represent around 4% of the security incidents counted over the last ten years. The main responses have, then, only really been centered on a relatively low proportion of attacks. Continue reading

Capture The Flag: A community game to strengthen and build your cybersecurity capabilities

Fancy developing your cyber capabilities in a fun and social setting? You should try a game of Capture the Flag (CTF) in which participants attempt to hack a computer system. A CTF benefits everyone involved: hackers get to show off their skills, and companies can test their systems in a controlled environment. How is it played? What are the challenges? We explain all there is to know about this phenomenon. Continue reading