Starmerβs team is wary of spies but such fears are not new β with Theresa May once warned to get dressed under a duvet
When prime ministers travel to China, heightened security arrangements are a given β as is the quiet game of cat and mouse that takes place behind the scenes as each country tests out each otherβs tradecraft and capabilities.
Keir Starmerβs team has been issued with burner phones and fresh sim cards, and is using temporary email addresses, to prevent devices being loaded with spyware or UK government servers being hacked into.
The US Supreme Court is considering the constitutionality of geofence warrants.
The case centers on the trial of Okello Chatrie, a Virginia man who pleaded guilty to a 2019 robbery outside of Richmond and was sentenced to almost 12 years in prison for stealing $195,000 at gunpoint.
Police probing the crime found security camera footage showing a man on a cell phone near the credit union that was robbed and asked Google to produce anonymized location data near the robbery site so they could determine who committed the crime. They did so, providing police with subscriber data for three people, one of whom was Chatrie. Police then searched Chatrieβs home and allegedly surfaced a gun, almost $100,000 in cash and incriminating notes.
Chatrieβs appeal challenges the constitutionality of geofence warrants, arguing that they violate individualsβ Fourth Amendment rights protecting against unreasonable searches.
President Donald Trump suggested Saturday that the U.S. used cyberattacks or other technical capabilities to cut power off in Caracas during strikes on the Venezuelan capital that led to the capture of Venezuelan President NicolΓ‘s Maduro.
If true, it would mark one of the most public uses of U.S. cyber power against another nation in recent memory. These operations are typically highly classified, and the U.S. is considered one of the most advanced nations in cyberspace operations globally.
The chair of the Office for Budget Responsibility has said he felt mortified by the early release of its budget forecasts as the watchdog launched a rapid inquiry into how it had βinadvertently made it possibleβ to see the documents.
Richard Hughes said he had written to the chancellor, Rachel Reeves, and the chair of the Treasury select committee, Meg Hillier, to apologise.
βBrit cardβ already facing opposition from privacy campaigners as government looks for ways to tackle illegal immigration
All working adults will need digital ID cards under plans to be announced by Keir Starmer, in a move that will spark a battle with civil liberties campaigners.
The prime minister will set out the measures on Friday at a conference on how progressive politicians can tackle the problems facing the UK, including addressing voter concerns around immigration.
CSRI finds China and Russia may be coordinating βgrey zoneβ tactics against vulnerable western infrastructure
China and Russia are stepping up sabotage operations targeting undersea cables and the UK is unprepared to meet the mounting threat, according to new analysis.
A report by the China Strategic Risks Institute (CSRI) analysed 12 incidents in which national authorities had investigated alleged undersea cable sabotage between January 2021 and April 2025. Of the 10 cases in which a suspect vessel was identified, eight were directly linked to China or Russia through flag-state registration or company ownership.
Kent Ickler // Background Over four years ago now, I wrote a blog post on fixing missing Content-Security-Policy by updating configuration on webservers: https://www.blackhillsinfosec.com/fix-missing-content-security-policy-website/. Content-Security-Policies instruct a userβs web browser [β¦]
Why are companies still recommending an 8-character password minimum?Β Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend [β¦]
Why are companies still recommending an 8-character password minimum?Β Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend [β¦]
Darin Roberts // βWhy do you recommend a 15-character password policy when (name your favorite policy here) recommends only 8-character minimum passwords?β I have had this question posed to me [β¦]
Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_ImplementingSysmonAppLocker.pdf 5:03 Introduction, problem statement, and executive problem [β¦]
Kent Ickler & Jordan Drysdale // Preface We had a sysadmin and security professional βAAβ meeting on November 8, 2018. We met and discussed things that seem to be painfully [β¦]
CJ Cox talks about the highs, lows, hows and whyβs of security policy. // Show Notes Why are we doing this? Do you hate your audience? GDPR was bad enough. [β¦]
David Fletcher// The weak password policy finding is typically an indicator of one of two conditions during a test: A password could be easily guessed using standard authentication mechanisms. A [β¦]
Kelsey Bellew // Dear Big All-Powerful Company, Your idea of a βstrong passwordβ is flawed. When I first saw the following message, I laughed. I said out loud, βNo, you [β¦]
Kent Ickler // Referrer-Policy, What-What? Referrer-PolicyΒ is a security header that can (and should) be included on communication from your websiteβs server to a client. The Referrer-Policy tells the web browser [β¦]
Kent Ickler // Content-Security-Policy-What-What? Content-Security-Policy is a security header that can (and should) be included on communication from your websiteβs server to a client. When a user goes to your [β¦]
Jordan Drysdale & Kent Ickler // In this webcast, we demonstrate some standard methodologies utilized during an internal network review. We also discuss various tools used to test network defenses [β¦]