SE Labs

Posts by Team

Ransomware detection using hardware

Computer processors get the final word when running programs. Can they judge bad code from good?

Ransomware Detection Using Hardware

Is ransomware detection using hardware possible? We look at Intel’s approach to improving ransomware detection.

All malware has to run on a target to achieve its goal. Whether it’s a remote access Trojan, a wild internet worm or devastating ransomware, malware is most likely software that has to run on a PC of some sort. The anti-virus software industry tries to detect and stop these threats, but news headlines suggest it’s not winning the war.

Read more >

Cyber Security DE:CODED – Full attack chain testing

“Because we test realistically, sometimes bad guys come onto our test network and mess with us”

SUBSCRIBE! Use one of the ‘Listen on’ links below to keep updated using your favourite podcast platform.

Listen on Apple Podcasts Listen on Spotify

Series 1 | Series 2

Other ways to listen: YouTube | Google Podcasts | Stitcher | RSS


Show notes for series 2, episode 9 (final episode of series 2)

What is the attack chain? Why is it good to test using full attack chains? And what are some of the alternative approaches, with their pros and cons? We’ll try to answer all of these questions and more in this special presentation episode recorded at the AVAR conference in Singapore in December 2022.

Read more >

Cyber Security DE:CODED – Cheating in security testing

“If they chose the best products by rolling a dice then they should say so”

SUBSCRIBE! Use one of the ‘Listen on’ links below to keep updated using your favourite podcast platform.

Listen on Apple Podcasts Listen on Spotify

Series 1 | Series 2

Other ways to listen: YouTube | Google Podcasts | Stitcher | RSS


Show notes for series 2, episode 8

If we’ve given the impression that we’re at the heart of the security world, working with the organisations that spend billions on security – and with the companies that make billions by selling security products – you’d be right. And that puts us in an awkward position. Because we want to make security better for everyone. And sometimes that means speaking some uncomfortable truths.

This episode is the uncomfortable truth episode.

Read more >

Choose your reviews carefully

Three reasons our security tests are the most trustworthy

Choose your reviews carefully

This security report compares anti-malware products. Its job is to help you make informed buying decisions. We applied advanced testing techniques to ensure that the results are meaningful. The same cannot be said for many other tests. I’d say you’ve picked a good one to read, here. Let’s prove that.

AMTSO Compliant

Security report checklist

There are a few questions you should ask when you look at a security report. These are all very important but in random order here they are:

ENDPOINT PROTECTION: NEW REPORTS ONLINE!

Read more >

Cyber Security DE:CODED – Security opportunities for Managed Service Providers

“Every SMB is an expert in something. A passion. It’s probably not anti-virus…”

SUBSCRIBE! Use one of the ‘Listen on’ links below to keep updated using your favourite podcast platform.

Listen on Apple Podcasts Listen on Spotify

Series 1 | Series 2

Other ways to listen: YouTube | Google Podcasts | Stitcher | RSS


Show notes for series 2, episode 7

Small business and Managed Service Provider special!

  • Do small businesses face the same cyber threats as large organisations?
  • Are your security solutions 100% effective? And how do you pick a good one?
  • Where are the opportunities for MSPs to add value and make more money?

In June 2022*, we set up a panel of security experts to help and advise companies selling managed security services. Managed Service Providers (MSPs) need to choose a set of security solutions that they can use or possibly resell to their small business clients, known as SMBs.

The clients face the same cyber threats as large organisations, but they’re far less equipped to handle them.

We answer all of these questions and more with special guests Martin Lee from Cisco, Chad Skipper from VMware, and Luis Corrons from Avast.

Security Life Hack from John Hawes (AMTSO)!

Read more >

Deep and direct ransomware testing

300 ways to run a ransomware attack!

Deep and Direct Ransomware Testing

SE Labs tested CrowdStrike Falcon against a range of ransomware attacks designed to extort victims. These attacks were realistic, using the same tactics and techniques as those used against victims in recent months.

Test like ransomware hackers

Testers attacked target systems, protected by CrowdStrike Falcon. Our testers in the lab acted in the same way as we observe ransomware groups to behave on the internet.

Attacks were initiated from the start of the attack chain, using phishing email links and attachments, as just two examples. Each attack was run from the very start to its obvious conclusion, which means attempting to steal, encrypt and destroy sensitive data on the target systems.

Read more >

Cyber Security DE:CODED – Mental health challenges

“We see the worst, because it’s helped us to evolve to pick up on threats and dangers. But it’s not that helpful for life in the 21st century.”

SUBSCRIBE! Use one of the ‘Listen on’ links below to keep updated using your favourite podcast platform.

Listen on Apple Podcasts Listen on Spotify

Series 1 | Series 2

Other ways to listen: YouTube | Google Podcasts | Stitcher | RSS


Show notes for series 2, episode 6

Mental health is an important but often misunderstood area, full of prejudice and technical jargon. How can we look after ourselves better at work and in our personal lives?

Post-pandemic, we take stock on the mental impacts of working from home and isolated environments.

And now we’re facing hybrid working. Can we take control?

Is this the right time to take stock and address any issues we can identify to stay happier?

Protective factors can keep us going but, when they disappear, we can experience problems.

We address all of these issues and more, with special guest Olly Church (The Eleos Partnership).

Security Life Hack from Luis Corrons (Avast)!

Read more >

Anti-virus testing

How hard should a security test be?

Anti-virus testing

Anti-virus testing

Thank you for opening this report. We hope you’ll be able to use it to get a better idea about which anti-malware products you might want to buy (or get rid of!)

What do the awards mean?

The report starts off with a list of products, each of which win impressive-looking awards. But have you considered what those awards mean? How come there aren’t any massive losers in the list? How hard is this security test anyway?

ENDPOINT PROTECTION: NEW REPORTS ONLINE!

Read more >

Cyber Security DE:CODED – Ransomware

“There’s usually about 30% corruption in backups”

SUBSCRIBE! Use one of the ‘Listen on’ links below to keep updated using your favourite podcast platform.

Listen on Apple Podcasts Listen on Spotify

Series 1 | Series 2

Other ways to listen: YouTube | Google Podcasts | Stitcher | RSS


Show notes for series 2, episode 5

Ransomware is feared by businesses all over the world. What happens during and after an attack? We give a unique insight into the experiences of ransomware victims.

How do organisations react to a ransomware attack?

We examine the grey area between good and bad apps

Guests on this month’s Cyber Security DE:CODED podcast include Jeremy Kirk (The Ransomware Files) and Dennis Batchelder (AppEsteem).

Security Life Hack from Brian Monkman (NetSecOPEN)!

Read more >

Cyber Security DE:CODED – Cloud security

“As long as anything is online, it’s open for strangers to try to break protection”

SUBSCRIBE! Use one of the ‘Listen on’ links below to keep updated using your favourite podcast platform.

Listen on Apple Podcasts Listen on Spotify

Series 1 | Series 2

Other ways to listen: YouTube | Google Podcasts | Stitcher | RSS


Show notes for series 2, episode 4

The ‘cloud’ is integrating with our lives at ever more useful (or intrusive!) levels. We look at what securing the cloud means in the real world.

Is it possible to secure your online life when you don’t control all of the systems in use?

Is anyone testing cloud security, or do we simply need to accept marketing claims?

Don’t lose your cryptocurrency to hackers and scammers. Our security tips focus on cryptocurrency investors.

What does a personal hack attack look like? Backups never seems more attractive…

Guests on this month’s Cyber Security DE:CODED podcast include Eugene Kaspersky (Kaspersky) and Luis Corrons (Avast).

Security Life Hack from Chad Skipper (VMware)!

Read more >

About

SE Labs Ltd is a private, independently-owned and run testing company that assesses security products and services. The main laboratory is located in Wimbledon, South London. It has excellent local and international travel connections. The lab is open for prearranged client visits.

Contact

SE Labs Ltd
Hill Place House
55A High Street
Wimbledon
SW19 5BA

info@selabs.uk

Press