Tuesday, August 21, 2018
Home Authors Posts by Charles Brett

Charles Brett

Charles Brett
Charles Brett is a business/technology analyst consultant. His specialist areas include enterprise software, blockchain and enterprise mobility tech (including metering). Specific industry sectors of interest and experience include finance (especially systems supporting wholesale finance), telecommunications and energy. Charles has spoken at multiple industry conferences, has written for numerous publications (including the London Times and the Financial Times). He was the General Chair of the bi-annual High Performance Systems Workshop, 2005. In addition he is an author and novelist. His Technology books include: Making the Most of Mobility Vol I (eBook, 2012); Explaining iTunes, iPhones and iPads for Windows Users (eBook, 2011); 5 Axes of Business Application Integration (2004). His published novels, in the Corruption Series, include: The HolyPhone Confessional Crisis, Corruption’s Price: A Spanish Deceit and Virginity Despoiled. The fourth in The Corruption Series - Resurrection - has is now available. Charles has a B.A. and M.A in Modern History from the University of Oxford. He has lived or worked in Italy, Abu Dhabi, South Africa, California and New York, Spain, Israel, Estonia and Cyprus.


Hacking prosecutions in UK fell in 2017

Hacking prosecutions continue to fall

There were just 47 prosecutions for hacking under the Computer Misuse Act in 2017 claims UK legal firm RPC. It is 18% lower than...
Team Warrior won the NCA-set F2F cyber security challenge

Forensics key to NCA challenge

29 people, one just 14 years of age, gathered at the Defence Academy of the United Kingdom for the latest Cyber Security Challenge face-to-face...
Marap downloader uses evasion techniques

Millions of emails spreading the Marap downloader

Researchers at Proofpoint have identified a new malware downloader they have called Marap. It is being used in a new email malspam campaign aimed...
FlawedAmmyy RAT targets users in banks

Malspam campaign drops FlawedAmmyy RAT

Trustwave has spotted a new malspam (malware spam) campaign posing as an invoice. Malspam emails with infected invoices are nothing new. Most organisations see...

MedChain and Cognition Foundry to use blockchain and IBM technology  

MedChain, a start-up building globally compliant healthcare blockchain and decentralized applications (dApps) for electronic medical records (EMRs), has announced it is teaming up with...
Okta finds Microsoft MFA vulnerability

Vulnerability hits Microsoft MFA

Multifactor Authentication is seen as the solution to weak password-based security. Unfortunately, like any solution, it is just as prone to vulnerabilities as anything...
boxers Image credit pixabay/skeeze

Oracle punches Rimini Street hard in court

Oracle has issued an almost gleeful announcement after its latest win in its ongoing litigation battle against Rimini Street. In contrast Rimini Street issued...

Partnership to accelerate space exploration through blockchain

Goonhilly Earth Station (Goonhilly), the UK satellite communications and space gateway, has announced it is collaborating with space blockchain technology pioneers, Spacebit. Their intention...
KeyPass ransomware starts to spread

KeyPass is the latest ransomware to hit computers

In the last week security researchers from several companies have reported seeing a new ransomware. It is called KeyPass and, according to Bleeping Computer,...
Cyber Resiliency with Felicity March

Talking Cyber Resilience with Felicity March

The risk of a business threatening cyber-attack is ever present today. Ransomware locks up data making it hard for businesses to operate. The impact...
Confiant detects largest single day malvertising attack

4 million malvertising hits blocked in a single day

Confiant has revealed that on 11 June it blocked the biggest single-day malware redirect ever seen. The attack lasted for more than 7.5 hours...
Do you have sufficient in-house cyber security skills?

Do you have sufficient in-house cyber security skills?

Struggling to find staff with cyber security skills? Can't find affordable staff to protect your data? That's not the case for customers of backup...
Duo Security investigates Twitter bots

Duo Security hunts Twitter Bots

There is considerable attention on the problem of fake social media accounts. These accounts are enrolled into botnets that are used to push fake...

 Hackers give the Fax a new lease of life

Forgotten about that fax in the corner of the office? Once the ‘must have’ communications device in every office, it has since be usurped...