The war against cyber terrorism continues

Recent photo leaking scandals has made us more aware than ever of the vulnerabilities of storing our personal information online. However there’s a new, relatively unknown, threat that could potentially expose far more than personal photos.

Security concept: Golden closed padlock on digital backgroundAs we move deeper into the digital age, we trust our computers, phones and storage devices to keep our personal lives safe, but how safe do we now feel they are? Just recently in the news a number of well known celebrities have been the target of hackers, finding and releasing personal pictures that were not intended for the public eye. This brings the cloud and it’s “vulnerabilities” to centre stage, and it is portrayed as a big scandal.

Shell Shock

What people don’t hear as much about is actually far more worrying than people seeing you without clothes on. Many will not of heard about Shell Shock, which is a new security vulnerability found in everything from iPhones and laptops to light bulbs and web cameras. It is being dubbed as worse than the Heartbleed bug which was found earlier this year.

The new bug enables hackers to exploit a vulnerability in Bash, a Unix Shell, which allows computer users to issue commands to an operating system. The Unix Shell is used by millions of devices all over the world and the hacker can take control of the device and steal information from it. The sort of information that can be obtained could be live imagery from a webcam, or credit card details from a transaction.

The problem with Bash is that it is just a small program, but it is integrated everywhere from servers through to mobile phones. Within a day of this news being released, one hacker had already created a botnet program to exploit the flaw, and others will be following suit in large numbers. As of yet there has not been a fix released to protect users against it, but administrators will be working hard to ensure this doesn’t remain open long.

How is the technology industry reacting?

With people’s details and data being at risk from those that desire to steal from others either for fun or for gain, the technology industry is constantly working on increased security levels. We will continue to connect our ever growing portfolio of devices to the internet, and share more of our personal property and details regardless of the dangers the hackers pose. With this in mind, people need to feel that there are security experts in all companies working hard to protect us from those who just want to watch the world burn.

We have noticed an increased demand for those with security expertise, so if you are already working in this area, or find it interesting, then please get in touch to see what opportunities we have.

 

Register for Updates

Register to receive news updates straight to your inbox.
  • We will only send you marketing information using the details you have provided to deliver, develop and promote our products and services if you give us consent to do so. Please use the options below to indicate if you consent to us using your information for this purpose. For further information please read our privacy notice.
  • This field is for validation purposes and should be left unchanged.

Newsletter

Sign up to our newsletter
  • We will only send you marketing information using the details you have provided to deliver, develop and promote our products and services if you give us consent to do so. Please use the options below to indicate if you consent to us using your information for this purpose. For further information please read our privacy notice.
  • This field is for validation purposes and should be left unchanged.

Technology Form

  • We will only send you marketing information using the details you have provided to deliver, develop and promote our products and services if you give us consent to do so. Please use the options below to indicate if you consent to us using your information for this purpose. For further information please read our privacy notice.

Get in touch with us

We're ready to show you the future of consulting. Just fill out the form below!
  • We will only send you marketing information using the details you have provided to deliver, develop and promote our products and services if you give us consent to do so. Please use the options below to indicate if you consent to us using your information for this purpose. For further information please read our privacy notice.

PPI Case Handler Profile

Complete your details below to receive our PPI Case Handler profile.
  • We will only send you marketing information using the details you have provided to deliver, develop and promote our products and services if you give us consent to do so. Please use the options below to indicate if you consent to us using your information for this purpose. For further information please read our privacy notice.
  • This field is for validation purposes and should be left unchanged.

Subject Access Request

    We require basic personal details to locate you on our records.

Request to Delete your Personal Data

    We require basic personal details to locate you on our records so we can delete your information.

Request to Withdraw Opt-In

    We require basic personal details to locate you on our records.