Welcome!

Guy Bunker

Subscribe to Guy Bunker: eMailAlertsEmail Alerts
Get Guy Bunker via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Guy Bunker
 OK please forgive this little marketing-type plug.... but I think this is a great little tool…. As you no doubt know, Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. More than 240,00...
... There was an interesting article in the news yesterday from an insurance company about which professions have the worst road accident records. Topping the list... ahead of sales managers and students... are computer engineers!!! Being an engineer at heart (although my programmin...
Wednesday 2nd September was the 'official' 40th anniversary of the Internet. To mark this important milestone we thought we'd take a look back at some of the most notorious threats ever seen online.  I Love You (2000) – Who wouldn’t open an e-mail with “I Love You” in the subject lin...
... Or something more disturbing? So, Wikipedia is finally closing its doors to unrestricted editing, why? Well because it was being abused - and the reputation of the site was falling. When the Internet first came on the scene, the data was 'good', because the people who used it, want...
... Credit card numbers that is. That's what one person has been charged with stealing from several different companies. If convicted he could end up with 25 years in prison and £300,000 fine - which is serious stuff. However, what about those who have had their credit cards stolen... ...
Even safe sites aren’t safe anymore, not if you don’t pay attention anyway. Symantec has recently spotted a phishing attack that used a legitimate SSL certificate to masquerade as a legitimate site. Fraudsters continue to use these kinds of techniques to perpetuate identity theft and t...
A couple of the largest social network sites have recently suffered from denial of service attacks. In one case, the website was taken down for a couple of hours and in the other, there was a reduced service. OK, so this was social networking... who cares? Well, you should... especial...
At the end of 2008, Symantec’s security researchers made several predictions regarding trends to watch for in 2009. So several months on, how are we doing with the predictions? Our experts said that some of the threats we’d see in 2009 would include a continued explosion of new malwar...
Finding ways to substantially cut costs and complexity in an active, vibrant Data Centre is not easy. CIO's have spent years trimming here and there and, to many, further demand from the business to reduce CAPEX/OPEX can seem like asking the impossible. Nonetheless, significant additi...
A bit of good news it seems as it appears spammers have failed to capitalise on the worldwide release of the blockbuster movie “Harry Potter and the Half-Blood Prince” on 15 July.  Symantec Security Response is detecting very few spam messages on this topic, a hopeful indication that c...
In a novel attempt to help everyone save money, SPRANQ has created 'eco font'. Which is a font with holes in... so it uses less ink! In using less ink (up to about 20%) it can save you money - pretty cool - and a great example of some lateral ...
Ransom attacks on computers where cybercriminals lock victims out of their computers to extract a financial ransom are already a commonly used cybercrime technique.   Symantec Security Response has recently detected a new evolution of ransom threats with the discovery of Trojan.Ransomp...
It is interesting how some companies define an acceptable disaster recovery strategy. I met with a bank in Saudi Arabia recently who explained to me that they need to implement a complete DR plan in the next 4 months (!) from scratch. When I asked them to describe what needed ...
There's a great article in this months E&T magazine from the IET on the need to manage your online presence after you have died. OK, so you won't be able to do it yourself, so you therefore need to figure out who will. In essence, the advice is to keep a record ...
Symantec Security Response has identified yet another two web browser attacks, one on Microsoft Internet Explorer and the other on Firefox. Two weeks ago we reported the Microsoft Video Streaming Active X control vulnerability, which can be exploited mostly through the older but still ...
We have detected, yet another variant of the Koobface worm. This variant, detected as W32.Koobface.C, installs the misleading application detected as AntiVirus2008, and is propagating on Twitter. Now, this worm is not new, since it was discovered last year in August 2008, but it has co...
As the world mourns the loss of a musical hero, spammers are jumping on the bandwagon and using it as a tactic to distribute spam. Since his death on June 25, several spam and malware campaigns have taken shape. The spam subject headings used have been as creative and emotive ...
Symantec Security Response is continuing to monitor a cyber attack – a distributed denial of service (DDoS) – impacting multiple U.S. and South Korean government, financial and media Web sites. A portion of the attack is being carried out by a piece of malware Symantec has identified a...
So the new head of MI6 has been caught on a Social Networking site - just being himself. What's wrong with that you may well ask... well, apparently it's all to do with national security. Whether it is, or not, I leave to you but there is a lesson in ...
With summer in full swing, travel plans are on the horizon for many of us!    As much as sunscreen and books are travel necessities, so are laptops and Smartphones – and to get online, people are increasingly taking advantage of wireless (Wi-Fi) networks - at airports, hotels, even wh...
The spammers have been out in force once more with the deaths of Michael Jackson and Farrah Fawcett providing the bait for unwary consumers - cyber-criminals just love celebrity gossip as a hook for phishing. Additionally, Twitter accounts have also been hacked with the Britney Spears ...
Today is the first day of the ENISA (European Network & Information Security Agency) face-to-face meeting on cloud computing security. There is an eclectic set of people in the room, from across Europe. One thing everyone agrees on is that the cloud is coming and security is the bigges...
A year after the UK’s worst floods on record, it is clear that businesses, as well as consumers, cannot take potential risks such as natural disasters lightly. In the same week we have seen the Government unveil its National Security Strategy. The news agenda is all about protection an...
Recently Microsoft released a BETA of its ‘Morro’ free anti-virus product. They also announced the name for the product, hence forward, it will be called Microsoft Security Essentials. Microsoft Security Essentials is a slightly modified and stripped down version of the OneCare produc...
What was most interesting from the Security of the Future event which Symantec ran yesterday was that businesses are unclear on how to handle cloud technology. The event brought together security and privacy experts from across Europe at a roundtable discussion to debate the benefits o...
Data, data everywhere - or so it seems. It is tough to imagine living our lives without email and the internet, but that accessibility and flexibility comes with risk. It seems like hardly a day goes by without the media reporting a cybercriminal hacking into a database, or a company l...
Google released their latest whitepaper on the future of the datacentre - and it lives in a warehouse. In a play on the famous Sun 'the network is the computer', the Google view is that 'the datacentre is the computer'. For them, it makes sense, massive virtualization on thousands of c...
Later this week the UK Government is set to unveil the Digital Britain Report and at least according to some reports, at the heart of it will be a commitment to put broadband at the centre of British life, ensuring that by 2012 everyone in the country will have access to ...
Viewfromthebunker.com alerts are now available via Twitter, subscribe to @viewfromthebunk to get the latest posts.
It's interesting to see the increasing threat of malicious software distributed and spread through removable devices. Just as hackers and malicious software writers of the late 80's and early 90's once used simple executable files on floppy discs to spread their wares, so too now they ...
I read with interest that VNU is reporting that Global IP traffic is to swell fivefold by 2013. That's an amazing number driven by the spread of high-speed broadband, ubiquitous internet access and the increasing use of high-definition video as we continue to find new ways to use the I...
Brian Madden in his blog last week suggested: “If Symantec buys a client hypervisor, they could dominate the desktop virtualization market in two years.” His argument, in essence, was that Symantec had the potential to take the market by storm by buying a client-side hypervisor company...
Pity poor EMC. It never rains but it pours! First, IDC releases its quarterly Storage Software Report, showing that Symantec was the only company to grow during Q109, narrowing EMC’s market share lead in Overall Storage Software. IDC also shows that Symantec extended its market share l...
So we all know that Cybercrime is on the increase. Botnets, phishing and driveby downloads are becoming increasingly prevalent for those using the web without protection and without due care and attention. But maybe we missed the obvious dangers - at least according to the BBC. They r...
Do you use a wireless keyboard? Ever wondered if someone could eavesdrop on what you are doing? Probably not... well, perhaps you should now think about it as there is an Open Source project (KeyKeriki) to be able to do just that. The plans and schematics have been released, but there ...
... But for how long? Another allegedly cyber-criminal friendly ISP based in the US has been shut down. Of course the shut-down is being appealed, but for the moment they are down. It's not as dramatic in some ways as earlier ones, as this is not just about spam (which ...
IT World has been running a competition for a caption relating to cloud computing... the results can be found here. Of course, the cartoon has had other interpretations, including Conficker and R.A.I.N. All good fun! Guy Bunker
BT has announced that it is going to give 20Mbps broadband for free over the coming months. They are not the first and certainly won't be the last - and to be honest it's great news. I wrote previously about how important the Internet is and how it is now an ...
Since its appearance in late - 2008, the Conficker/Downadup worm has become one of the most wide-spread threats to hit the Internet for a number of years. OK it got a huge amount of hype and media interest so that it can be easily overlooked that it is a complex ...
Apparently, small businesses are more naive than consumers (which must take some doing). A recent study of small businesses reveals that small businesses are not frequently backing up their data. Nary the sound of an earthquake, nor the proverbial dog munching its way through another l...