Security News (106 Posts)

1 2 3 4 5 ... Last - Previous >>

The WhatsApp Privacy Question

With Facebook recently changing its terms and privacy policy for all its WhatsApp users outside of the EU, it seems to have made a lot of people angry.

When it comes to (your) data privacy and what this update means to non-EU WhatsApp’s users, in the end, I believe it does not mean much difference to what existed before! and if you are ok with targeted Marketing then there is no need to do anything different.

Facebook/WhatsApp just put the spotlight on how personal information is being crossed reference and used for marketing purposes. It happened before but it seems more people this time around are more receptive about the implication of such practice and thus it is creating a wave of exode to over more privacy conscious messaging platforms.

Let's ask ourselves 3x basic questions about this situation:
1. What can WhatsApp see now?
WhatsApp cannot see the content of the messages sent through its platform (allegedly, but let’s assume t...

Free Cyber Incident Playbooks on GitHub

We are in the process of migrating our free resources/download to GitHub in an effort to facilitate the contribution from and to the cyber security community.

The first open source project we uploaded to GitHub is our cryptography project (BUGS) and the second one is our ES Cyber Incident playbooks project.

Our Cyber incident playbooks project is based on the work done by the CERT Societe Generale (SG CERT) which is available for free, under the Creative Commons Attribution 3.0 Unported License, on GitHub. Our project uses the same licensing model and you are free to use the content of our document(s) as per the aforementioned license and with referencing the author(s).

This project provides a number of Incident Response Methodologies (IRM), also called incident playbooks, aimed at helping a company with the handling of different t...


There is a growing type of phishing attack which has been quite successful since the beginning of 2020, it is called a "Consent Phishing"

Traditional email phishing attacks will try to get the victim's credentials through a dangerous URL with a fake login webpage, a malware attachment or some other clever social engineering tactics.
Hopefully companies have some anti-phishing tools/technology to detect and protect them against most of those type of emails (some always manage to get through, no matter what technology you use and what vendors promise you!)

However, there is a new type of phishing attacks that leverages the OAuth authorisation framework used by some applications to access your account. Basically, there are a lot of legitimate applications that will request access to your O365 account (it could also be another type of Cloud app provider) through the generation of an OAuth token, so they don't need to know (and store) your O365 password.


Below is a link to an interesting article arguing that cyber insurance claims might be affected by the recent surge of working from home, and especially working from a personal computer/endpoint.
It opens up to a wider question as to whether or not the COVID-19 will have an impact on some (other) cyber insurance claims.

What we have seen from various online publications, specialised forums and discussions is a consensus towards the following answer: "probably not".

Taking into consideration what the above article is discussing, the answer is actually "probably not directly".
As companies/employees are setting up new ways of working, most of the time in a hurry, consideration of the potential impact on their cyber insurance is probably not at the top of their list.

One possible way to look at th...


Starting on the 6th of April, ELYSIUMSECURITY will offer a free service for the community in Mauritius. If you are a small business who has recently setup an online shopping website we can test the security of your website/platform at no charge and provide you with a short report on potential security vulnerabilities alongside some practical advice on how to fix them.

In these difficult times it is very important to help each other. More and more people are now looking at remote shopping online (we are!), so it is important those new websites do not get hacked and we can all continue to use those online services.

Below are the key points of this free service:

  • 100% free with no future commitment or “after sale” nonsense, it is our way to say thank you to all those businesses and services that help the community in those hard times;
  • You will need to provide proof your own the website/service to be tested;
  • We will enter into a simplifie
  • ...
    >>[READ MORE]

    The problem with password expiry

    When it comes to password expiry, different companies have different policies.
    Whilst the current industry standard is 90 days, a lot of companies do enforce a lower 30 days period or anything in between 30 and 90 days.
    If you ask the users, they do not tend to be happy with changing passwords often and even at all (are you?)

    The problem with changing passwords often is that, unless you are using some kind of password safe with random generated passwords, users tend to just change a letter or number at the end of their password (1, 2, 3 or 2019, 2020, etc.), chose another weak password all together or write it down somewhere.
    And if users do that, then changing their passwords often does not improve your security posture.

    We therefore advise not to go lower than 90 days when it comes to password expiry, in fact when it comes to authentication security, we would highly recommend that you enforce dual factor authentication through SMS or App for s...
    >>[READ MORE]

    Afer 17 years, a NEW BUGS Cryptography Package for Unix (version 4.1.2)

    BUGS is a personal cyber security project from Sylvain Martinez, which started about 25 years ago and has enabled him to kick start his career in Cyber Security.
    As such it has a special place in the heart of ELYSIUMSECURITY.
    It is an open source project where Sylvain created his own symmetric cryptography algorithm along with a few applications to showcase the capability of his cryptography algorythm:
    An application to encrypt/decrypt files, a simple encrypted chat application, a secure shell add-on, a password manager, etc.

    This project is a hobby and should only be seen as that, any respectable professional cryptographer would tell you this: "Do not create your own cryptography algorithm"!
    Furthermore, we always advise our clients to only use international standard algorithms (i.e.: AES)

    Having said that, it doesn't mean we cannot have a go ourselves!
    It had the merit of teaching us a lot about cryptography and after all, no one ha...
    >>[READ MORE]


    In the past 6 months, ELYSIUMSECURITY has looked at 10 of the most popular Cyber Security reports of 2019 and created an overview document summarising their main trends and predictions.
    The results will be presented at the next MU.SCL event (free registration HERE) but you can already have a look at the main findings by downloading the presentation in the DOWNLOAD section.

    >>[READ MORE]


    ELYSIUMSECURITY has designed a practical framework to help organisations implement an efficient Phishing Protection program.
    Phishing has become the number one attack vector used by criminals to get around most companies defences and use social engineering to extract confidential information and conduct financial frauds.

    For an efficient Phishing Protection program, organisations must consider not only implementing awareness and simulation campaigns but also integrate them to their phishing detection and protection strategy.

    More information on how to implement this framework is available in our DOWNLOAD section.

    >>[READ MORE]


    ELYSIUMSECURITY was asked to participate in the 2019 Mauritius National Cyber Drill where we presented on Incident Response in front of Mauritian organisations that are critical to the operation of the country. We took this opportunity to introduce the core concepts of the NIST SP 800-61 Incident Response framework.

    We also provided a high level view of the ELYSIUMSECURITY Incident Response framework, which is a practical implementation of the NIST SP 800-61 Incident Response frameworkand the FIRST CSIRT services Framework

    The updated presentation slides are available in our DOWNLOAD section...
    >>[READ MORE]