Ken Munro

Recent articles by Ken Munro

Social networking websites make recruiting spies difficult

Social networking websites make recruiting spies difficult

A social networking world makes it harder for the UK intelligence services to recruit a spy without a profile, as Ken Munro explains.
Feb 4 2009 2:53PM
At risk from grudge bearers?

At risk from grudge bearers?

The bitter reality of tough times can be made more sour by bad relations with the employees who can do real damage.
Dec 10 2008 3:58PM
New tech, old threats

New tech, old threats

With flaws in many new products, vendors should listen a bit more to the research community perhaps
Oct 14 2008 3:26PM
Powerful password thieves

Powerful password thieves

Video processors are a powerful weapon when it comes to password cracking, and they're easily available
Jun 6 2008 3:23PM
How exposed are you?

How exposed are you?

Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
May 22 2008 3:26PM
Is your router rooted?

Is your router rooted?

Could firmware infections during the manufacturing process create backdoors in your network?
May 7 2008 11:27AM
When hackers think small: SME security

When hackers think small: SME security

As big business finally gets a hold on security, SMEs relying on off-the-shelf e-commerce tools are easy prey.
Mar 22 2008 5:00PM
Change default credentials

Change default credentials

The easiest way into any system is likely to be the defaults, so make sure you don't leave an open door for criminals.
Mar 4 2008 10:23AM
Wasn't that encrypted?

Wasn't that encrypted?

Encryption is pointless if not applied to an entire session. It only gives users a false sense of security.
Jan 22 2008 11:26AM
Hotel room security: Service not included

Hotel room security: Service not included

From keycards to mini bars, modern technology has equipped hotel rooms with multiple vulnerabilities. One of our consultants had his personal laptop stolen from a locked hotel room recently. There was no evidence of a forced entry, suggesting an inside job.
Nov 27 2007 3:35PM
Kill deleted data for good

Kill deleted data for good

We spend a lot of time trying to secure mobile devices, but what about the removable storage cards they contain?
Nov 19 2007 3:16PM
Be smart with your phone

Be smart with your phone

As we start to pay bills and surf the web from our mobile phones, it's not the handsets thieves will be after.
Oct 5 2007 8:04AM
Patch Management: Prioritise before you mend

Patch Management: Prioritise before you mend

Time is critical when it comes to patches, so make sure you don't miss out on any critical releases.
Sep 21 2007 2:35PM
Get those festival tickets

Get those festival tickets

A bit of knowledge and research means you can get those coveted tickets while everyone else is hitting "refresh".
Jul 30 2007 6:36AM
Drivers need patching too

Drivers need patching too

Hard drives are often overlooked when it comes to patching. But an exploit in this area could be fateful.
Apr 24 2007 10:07AM
XSS is a large problem

XSS is a large problem

Seen as an end-user issue, cross-site scripting has been ignored for too long. Now attacks are on the rise.
Feb 28 2007 2:27PM
Don't get cocky about RFID

Don't get cocky about RFID

Are RFID keycards the next big thing? Only if they can see off power attacks, warns Ken Munro
Jul 12 2006 2:13PM
The strength of the pound

The strength of the pound

One simple way to improve your firm’s password security is incorporating non-US characters. Ken Munro explains
May 9 2006 4:24PM
A new angle on phishing

A new angle on phishing

Mophophishing may prove a threat too far for banking customers, writes Ken Munro
Nov 10 2005 4:13PM

Log In

Username / Email:
Password:
  |  Forgot your password?