Most forms of disruption today are about digitisation. Netflix has revolutionised the way people experience videos, providing non-linear viewing (unchaining us from TV guides) and easy access (no DVD rentals). But there are a multitude of ways digital products, data and processes can be used to create novelty and value without necessarily “disrupting”. It’s worthwhile…

If you are familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extortion has been around for centuries – well before “The Godfather” or “Goodfellas.” Even cyber extortion, which extends this criminal activity into the digital world, isn’t new. What is new, however,…

On September 7, credit reporting agency Equifax announced “a cybersecurity incident potentially impacting approximately 143 million US consumers.” To put this in context, at this time, this incident is almost seven times larger than the Office of Personnel Management breach of 2015. Equifax discovered the unauthorized access on July 29 and determined that the intrusion…

Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised websites, malicious adverts and social engineering to direct web traffic to their landing pages and attempt the exploitation of vulnerable software. Operated by various actors and groups, exploit kits possess different features, use…