logo.png
Guided Website Threat Review

Foregenix Blog

Duncan Slater

Foregenix Review of the Office for National Statistics Crime Survey

Cybersecurity, fraud

,21/07/17 10:15

Today [July 20th 2017] the Office for National Statistics in the UK released their annual Crime Survey for England and Wales (CSEW), for the twelve month period March 2016 through to March 2017. Once again, Cyber crime (defined by the CSEW as cases where the internet or any type of online activity was related to any aspect of the offence) featured prominently in the report. 

Read More
Benjamin Hosack

Magento Websites: How is the security health of your website?

web security, Magento, Cybersecurity

,10/07/17 16:40
Cyber security is a hot topic, with articles appearing most days within the mainstream media.   As consumers, we’re all becoming more cyber-aware as we see the latest well-known brand in the headlines for having lost their client data.

Most of us will have been affected by a credit card breach within the last few years - I can’t imagine there could be many people in first world countries who have not had their credit / debit card details stolen and received a replacement card from their bank. It's a major hassle - stressful and a huge waste of time.

Read More
Kirsty Trainer

Take the Guesswork Out of Your Website Security

web security

,07/07/17 16:41

Let’s say that someone approaches you on the street one day.

They point to a busy shop across the street, and they say to you, “That’s my store, and we’re having our best year ever!”

The shop is full of excited people. You step back outside, and the shopkeeper asks you a question: “What do you think I need to do to keep this place safe?”

Read More
Andrew McKenna

Why You Need To Defend Against Nation State Attacks

,06/07/17 16:21

A few months ago, I was working on a risk assessment with a business and one of the most extreme threats, beyond targeted malware, was an attack by a nation state. Given the nature of the business being assessed wasn't involved in, or related to critical infrastructure, and the IP wasn't such that it was of national or military importance to gain leverage, we gave the risk a low rating. In recent months, due to the leaking of custom malware developed by the NSA, the tools considered available only to nation states are now available to everyone. Where the internet democratised the attack vectors employable against entities with an online presence, the leak of custom, targeted malware, has lowered the barrier to entry such that even non-sophisticated malicious actors can leverage the experience, expertise and destructive force of a nation state.

Read More
David Kirkpatrick

Penetration Testing: The Quest For Fully UnDetectable Malware

Malware continues to be one of the main attack vectors used by criminals to compromise user and corporate data. Using phishing or social engineering based attacks, criminals attempt to lure the unsuspecting victim to launch a malicious piece of code that can do anything from sit there in the background as a zombie waiting for the next instruction, or do something more malicious such as lock your computer and demand payment as seen in the recent NHS WannaCry and Petya/NotPetya ransomware breakouts (as badly orchestrated as they may both have been).

Read More
Duncan Slater

Foregenix Review of the Office for National Statistics Crime Survey

Cybersecurity, fraud

,21/07/17 10:15

Today [July 20th 2017] the Office for National Statistics in the UK released their annual Crime Survey for England and Wales (CSEW), for the twelve month period March 2016 through to March 2017. Once again, Cyber crime (defined by the CSEW as cases where the internet or any type of online activity was related to any aspect of the offence) featured prominently in the report. 

Read More
Benjamin Hosack

Magento Websites: How is the security health of your website?

web security, Magento, Cybersecurity

,10/07/17 16:40
Cyber security is a hot topic, with articles appearing most days within the mainstream media.   As consumers, we’re all becoming more cyber-aware as we see the latest well-known brand in the headlines for having lost their client data.

Most of us will have been affected by a credit card breach within the last few years - I can’t imagine there could be many people in first world countries who have not had their credit / debit card details stolen and received a replacement card from their bank. It's a major hassle - stressful and a huge waste of time.

Read More
Kirsty Trainer

Take the Guesswork Out of Your Website Security

web security

,07/07/17 16:41

Let’s say that someone approaches you on the street one day.

They point to a busy shop across the street, and they say to you, “That’s my store, and we’re having our best year ever!”

The shop is full of excited people. You step back outside, and the shopkeeper asks you a question: “What do you think I need to do to keep this place safe?”

Read More
Andrew McKenna

Why You Need To Defend Against Nation State Attacks

,06/07/17 16:21

A few months ago, I was working on a risk assessment with a business and one of the most extreme threats, beyond targeted malware, was an attack by a nation state. Given the nature of the business being assessed wasn't involved in, or related to critical infrastructure, and the IP wasn't such that it was of national or military importance to gain leverage, we gave the risk a low rating. In recent months, due to the leaking of custom malware developed by the NSA, the tools considered available only to nation states are now available to everyone. Where the internet democratised the attack vectors employable against entities with an online presence, the leak of custom, targeted malware, has lowered the barrier to entry such that even non-sophisticated malicious actors can leverage the experience, expertise and destructive force of a nation state.

Read More
David Kirkpatrick

Penetration Testing: The Quest For Fully UnDetectable Malware

Malware continues to be one of the main attack vectors used by criminals to compromise user and corporate data. Using phishing or social engineering based attacks, criminals attempt to lure the unsuspecting victim to launch a malicious piece of code that can do anything from sit there in the background as a zombie waiting for the next instruction, or do something more malicious such as lock your computer and demand payment as seen in the recent NHS WannaCry and Petya/NotPetya ransomware breakouts (as badly orchestrated as they may both have been).

Read More

Cyber Security Insights

Duncan Slater
21/07/17 10:15

Foregenix Review of the Office for National Statistics Crime Survey

Today [July 20th 2017] the Office for National Statistics in the UK released their annual Crime Survey for England and Wales (CSEW), for the twelve ...

Read More

Benjamin Hosack
10/07/17 16:40

Magento Websites: How is the security health of your website?

Cyber security is a hot topic, with articles appearing most days within the mainstream media.  As consumers, we’re all becoming more cyber-aware as ...

Read More

Kirsty Trainer
07/07/17 16:41

Take the Guesswork Out of Your Website Security

Let’s say that someone approaches you on the street one day. They point to a busy shop across the street, and they say to you, “That’s my store, and ...

Read More

Andrew McKenna
06/07/17 16:21

Why You Need To Defend Against Nation State Attacks

A few months ago, I was working on a risk assessment with a business and one of the most extreme threats, beyond targeted malware, was an attack by a ...

Read More

David Kirkpatrick
05/07/17 10:57

Penetration Testing: The Quest For Fully UnDetectable Malware

Malware continues to be one of the main attack vectors used by criminals to compromise user and corporate data. Using phishing or social engineering ...

Read More