ConCon Blog

Show left menu  
Hide left menu  
Hacker on a computer
The Cyber Threat and Terrorism

By Tom Williams, 02 Nov. 2015

The concept of cyber terrorism, or extremists utilising offensive cyber techniques, is one that gains wide publicity and grabs attention; but what is the reality of this threat? Russian-based Islamic ...

django
Make a Django app insecure? It's not easy and that's a good thing!

By Patrick Craston, 19 Oct. 2015

The OWASP Top 10 describes the most critical and most commonly occurring security flaws in web applications. This list is published every three years and although some issues move up ...

Lock
Alarm bells ringing!

By Neil Biggs, 05 Oct. 2015

In previous blog posts we examined peripheral devices that are considered to be part of the Internet of Things (IoT), such as printers (Hacking Canon Pixma Printers - Doomed Encryption) ...

Social Engineering
Hacking without Computers – An Introduction to Social Engineering

By Owen Wright, 21 Sept. 2015

The concept of manipulating people and processes for some benefit pre-dates the invention of computers and the concept of cyber security, and goes well beyond the realms of IT and ...

Godfather.png
Nation States: The Godfathers of Targeted Attacks

By Kat Demidecka, 15 Sept. 2015

For many years the world of targeted cyber attacks was limited to nation states; few others had the understanding, resources or much to gain from carrying out such an attack. ...

Guide book
A Scout’s Guide to Incident Response

By Nick Mazitelli, 08 Sept. 2015

This part of our blog series, covering the recent work we have done with the Institution of Engineering and Technology, looks at incident response, drawing on the article we contributed ...

Shield of magnifying glass
Good advice, a rare commodity?

By Nick Mazitelli, 02 Sept. 2015

Information is the lifeblood of effective cyber security. Without a current understanding of the threats, protections, technologies and best practices cyber security activity will be divorced from the reality on ...

Back to Top