Dr David J Day meets Mustafa Al-Bassam ex black-hat hacker with the hacking fraternity Lulzsec. David helped collect forensic evidence that led to his conviction. This is the first time they have met. This award nominated piece was presented by Susan Watts.
Recently I was invited to deliver a talk at the Young Rail Professionals Forum at SNC Lavalin in Derby. I took this as a great opportunity to research the industry and fathom where the weaknesses exist, and what the worst-case rail scenarios for a cyber breach could be. Most of my career has been spent […]
Hello all and welcome to our latest case study. This week I will be dissecting an incident response case on a high profile retail firm and discussing why poor email and user account management is causing us a terrible security headache. Recently we performed an incident response for a national chain retail client who had […]
Feed up of ridiculous unfathomable car insurance price hikes? Read on to find out how to use GDPR to fight back. Here is the scenario. A while ago my Mum picked my Dad up from hospital (nothing serious). While parked, the car got hit by a careless driver. He cleared off but luckily an ambulance […]
A talk on passwords, phishing and social engineering at the Building Merchants Federation
Here discussing York City Councils Planet York App breach on the 5′ oclock news for BBC Look North This was where I appeared on the 10 o’clock news for BBC Look North discussing the York City Council Planet York App hack. Offering some password advice.
I discussed the impact of the Planet York App hack with Jules Bellerby. 20/11/2018.
This interview happened after BBC R4 listeners were phoning in about receiving TalkTalk scam calls when they weren’t even with talktalk when the breach happened. My view was corruption with outsources Wipro.
I discussed the talktalk breach not only as an expert in information security but also from a victims perspective as my Dad was recieving calls from from scammers after his information was leaked.
Hello all, I’m in the dentist waiting room (long story) and since I have a little time to kill, I’ll take the opportunity to regale a concerning information security anecdote. This tale involves a SaaS provider taking a frankly shocking view as to what is acceptable in terms of information security practice. As tempting as […]