All posts

Mac anti-virus

All you need to know about anti-virus on the Mac.

Mac anti-virus

At SE Labs we are often asked, “which is the best anti-virus for the Mac?” And, “do you need anti-malware for MacBooks?” For reasons we’ll explain, we’ve not published an endpoint security report for Mac-based products (yet).

But we do have an insight into how Mac threats work and how Apple tries to protect users. In this article we cover everything you need to know.

Continue reading “Mac anti-virus”
All posts

Cyber Security DE:CODED – Firewall speeds and VPN risks

“If they are not getting any money from you, then where are they getting the money from?”

Show notes for series 2, episode 2

Is your firewall as fast as you think? What does XDR mean and how does it work? Do you need a personal VPN?

We talk to Brian Monkman (NetSecOPEN), Chad Skipper (VMware), Luis Corrons (Avast) and Daniel Cuthbert.

This episode’s Security Life Hack from Dennis Batchelder (AppEsteem)!

Continue reading “Cyber Security DE:CODED – Firewall speeds and VPN risks”
All posts

Realistic cybersecurity testing

Simulated or real attacks in cybersecurity testing?

Realistic cybersecurity testing

There are many different ways to test cybersecurity products. Most of the common approaches are useful when evaluating a service or system, but they each have pros and cons. In this article we outline the basic differences and limitations. Can you achieve realistic cybersecurity testing?

Continue reading “Realistic cybersecurity testing”
All posts

Enterprise Advanced Security test expanded

The Enterprise Advanced Security testing programme includes new attack groups.

Enterprise Advanced Security

Our Enterprise Advanced Security (EAS) tests can assess any security software, hardware appliance, cloud service or combination thereof. Always evolving, these tests have expanded to include new attacks.

(These tests were originally called the Breach Response test. We renamed them for a number of reasons.)

Hackers and way they hack

Research on real attacker behaviour is a fundamental element of our EAS testing. Our team looks at the real-world behaviour of advanced threat groups, known as Advanced Persistent Threats (APTs).

Continue reading “Enterprise Advanced Security test expanded”
All posts

Email ransom attack without the malware

Do You Do Any of These Embarrassing Things?

Email ransom attack

Email ransom attacks are easy and common. It’s like ransomware, but without the clever coding. Not every hacking attack has to be sophisticated. Sometimes hackers simply demand money, with the threat of making life worse if you don’t pay.

Your Device Was Hacked

The following is an example of a non-targeted, completely opportunistic email ransom attack that threatens to expose embarrassing personal details. A ransom of $1,650 will ensure the details stay private.

Continue reading “Email ransom attack without the malware”
All posts

NDR – Now Done Realistically

SE Labs launches first public Network Detection and Response test

Network Detection and Response

SE Labs tested VMware NSX Network Detection and Response against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.

Full attack chain test in the datacentre

By running the most realistic set of attacks possible we put NDR products to a significant challenge. Can they detect real attacks in real-time, often using unique scripts and malware? If you want to know more about advanced persistent threats on the network please read past the initial graphs in this report and dig into the detail.

Continue reading “NDR – Now Done Realistically”
All posts

Email security: A beginner’s guide

How SE Labs tests and scores email security services

Email scoring

Email security services can do a lot to protect users from online threats. This also means a lot can go wrong too. Testing and scoring these services requires a lot of attention to detail and a scoring method that takes into account all of the possible outcomes, including unexpected ones.

Learn:

  • How email security services work
  • How you should use them
  • Why we score services the way we do
Continue reading “Email security: A beginner’s guide”
All posts

Cyber Security DE:CODED Series One

Binge on all episodes of Cyber Security DE:CODED, Series One.

Find all of the episodes from the award-winning Cyber Security DE:CODED Series One in one handy place.

Continue reading “Cyber Security DE:CODED Series One”
All posts

Cyber Security DE:CODED – What Does a Breach Look Like?

“I always work on the assumption that you’ve been compromised”

Show notes for series 1, episode 7

What does a computer security breach look like? We talk about the things journalists don’t cover. And we examine some areas that people in the industry don’t like to talk about.

Continue reading “Cyber Security DE:CODED – What Does a Breach Look Like?”
All posts

Cyber Security DE:CODED – Understanding and Managing Risk

“No one ever thinks it’s going to be them.”

Show notes for series 1, episode 6

In this episode Simon and Marc focus on the basics of understanding and managing risk. They discuss insurance, how to assess the risk of anything (from dropping a cup of tea on an expensive server to animal attacks!) and touch on ransomware.

Continue reading “Cyber Security DE:CODED – Understanding and Managing Risk”

Contact us

Please contact us and we will get back to you as soon as possible.


Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us