WannaCry?

WannaCry?

The first and so far the only time I was personally involved, (or to be more precise my son who at that time was eleven years old), in a cyber-attack by ransomware was in 2012. The computer of my son was apparently blocked by the Federal Criminal Police Office due to some illegal actions, such as sending spam mails and even worse. At least that’s what appeared on the screen in poor German....

read more
First SHA-1 collision

First SHA-1 collision

In February this year, a team of researchers both from Google and CWI Institute in Amsterdam announced that they were able to generate two PDFs documents with different content that would hash into the same SHA-1 digest. This may lead to a big problem in security that I will try to explain to you but first let’s put ourselves in context. What is a hash? The hash functions are one of the most...

read more
1st Advent…when the routers turn off

1st Advent…when the routers turn off

At the end of November, the pre-Christmas season usually starts in Germany. The famous Christmas Markets, such as the Christkindle market in Nuremberg, open in every city and people celebrate the first Advent by lighting the first of four candles of the Advent wreath. Usually, the first Advent is the day when the contemplative time starts. The 27th of November, the first Advent in 2016 was for...

read more
Internet of Things (IoT) Security

Internet of Things (IoT) Security

Since September, several cyber-attacks have targeted a series of entities present in the network (including DNS Internet service providers, numerous webs residing in Liberia and the personal page of an expert in online security). They were all victims of distributed denial-of-service attacks (DDoS), where concentrated flows of traffic are sent every second from thousands of different addresses...

read more
SD-WAN and security implications –Part 2

SD-WAN and security implications –Part 2

  In my last blog, I wrote about the origins of SD-WAN and its benefits. However, these advantages are certainly not without their challengers and threats, which all interested companies should consider when analyzing the various options offered by the market. From a security point of view, the main threats arising have to do with the use of unprotected residential broadband networks....

read more
The role communications play in transport and the custody of securities

The role communications play in transport and the custody of securities

Despite the potential symbiosis between transport in armored cars and Information and Communication Technologies (ICT), two factors have prevented both sectors from making the most of the opportunities available. The first has to do with the limited bandwidth cellular technologies offered up until recently; the second with the lack of integration and interoperability of existing services (GPS,...

read more