Latest posts from Cyber security updates Join us on LinkedIn PwC UK YouTube channel Subscribe to our RSS feed Join us on Facebook Follow PwC on Twitter

27 February 2015

Private equity and cyber: 3 weak points of the general partner

By James Rashleigh Follow @james_rashleigh If you are a private equity general partner, and not directly involved in cyber security, you may well be astonished by how frequent, how persistent and how well organised cyber attacks are. You may well also be surprised that a private equity general partner –...

24 February 2015

A deeper look into ScanBox

By Chris Doman and Tom Lancaster Follow @chrisdoman Follow @tlansec Please e-mail us at threatintelligence@uk.pwc.com for a version of this report with additional indicators that you are welcome to distribute so long as it is not on public channels (TLP-GREEN). We have observed actors amending the ScanBox framework to evade...

20 February 2015

Call of Duty: Advanced Persistent Threat

By Christian Toon Follow @christiantoon A number of people condemn computer games these days for their violent depiction of behaviour, and this ‘altered reality' causes a distorted view of today’s society. Regardless of where you stand on this debate, there are a number of games I believe teach some important...

12 February 2015

Still worried about BYOD? Are you sure? Things have moved on. A lot.

By John Whitehill In my last industry role, I had the joint responsibility for both the corporate collaboration and security programmes. People often asked me about the apparent 'conflict' of these two areas and why I ended up with both. I would like to think it was because I believe...

05 February 2015

Shiny buckles, swords and cyber – are you protected?

By William Rimington Follow @WRimington Security is front of mind for all sorts of unpleasant reasons so far in 2015. Whether it’s Europe, Africa or the Middle East there is a tangible focus on battling adversaries across established geopolitical boundaries. Collaboration is key for the security forces and awareness and...

30 January 2015

Flash alert on Dridex phishing campaigns

By Chris Doman and Stephen Ramage Follow @chrisdoman Follow @SFRamage Over the past couple of days, we have observed several large Dridex campaigns targeting a large number of UK businesses. Judging from the number of online articles and VirusTotal uploads, the delivery e-mails for these campaigns are being very widely...

Password, hacks, ever increasing security requirements

By Richard Mardling Follow @rmardling Last week I was the recipient of a bright shiny new smartphone. Time to play and get used to new features! So I unpack it, insert the SIM card, go through the set up process and hey presto away we go. Well nearly. There are...

27 January 2015

Needle in a haystack - network logs

By Rob MacGregor I’ve written before about the need to instrument your network, focussing on session metadata and content. However there’s a lot more you can use to track activity – the logs that are, or can be, generated by many of the devices and servers on the network. Examples...

22 January 2015

Why a strong focus on safety in the aviation sector gives it a head-start in cyber security

By Dan Stevens Follow @stevensdanj A couple of weeks ago I needed to go abroad for work. It was only 30 minutes into the flight that I realised the member of cabin crew asking me what I wanted to drink (apple juice of course!) was the first person working for...

19 January 2015

Destructive malware - a closer look at an SMB worm tool

By Chris Doman Follow @chrisdoman On December 19 US-CERT released an alert, TA14-353A, relating to seven tools used to target a major entertainment company. Some, such as the “Network Propagation Wiper” have been well described before. Less well known, however, is the SMB Worm Tool which US-CERT describes as follows:...