Cyber Security

Welcome To The Hotel Malware

Alastair Paterson | Posted 24.08.2016 | UK Tech
Alastair Paterson

Our data is at risk and increasingly professional hackers target the connected devices we all rely on at home and in business, as they are often the weak spot in our cyber defenses extending our digital footprint even further into the web.

The Rise In Ransomware: How To Keep Your Data Out Of The Wrong Hands

Gad Elkin | Posted 23.08.2016 | UK Tech
Gad Elkin

Whilst attacks have increased in intensity, hacker groups have also chosen to flex their digital muscles by launching attacks to a very specific intensity, demonstrating their capabilities to victims.

Build or Buy: Securing IoT Is Harder Than It Looks for Device Manufacturers

Dominique Guinard | Posted 08.08.2016 | UK Tech
Dominique Guinard

In Mr Robot, Elliott Alderson explicitly exploits 'easy' vulnerabilities: obvious passwords, open back doors, etc. As the world inevitably becomes more connected, risks will accompany benefits; the starting point for security must always be best-practice encryption and protocols. Just as in the 'real' world, there will be break-ins - but they become much less likely if you lock all your doors and windows.

The US Air Force's Terrifying New Cyber Weapon Is Basically 'Skynet'

The Huffington Post UK | Thomas Tamblyn | Posted 08.03.2016 | UK Tech

The US Air Force has a terrifying new weapon against the increasing threat of cyber attacks and at first glance it bears a striking resemblance to 'Sk...

Fighting Crime Online: How Law Enforcement Agencies Are Working to Keep Citizens Safe

Russell Haworth | Posted 24.02.2016 | UK Tech
Russell Haworth

Tackling the broader cybercrime challenge needs an orchestrated response. I wanted to highlight three ways in which law enforcement agencies are working with each other and other organisations (including my own) to tackle the real and very present danger represented by opportunistic and organised criminals online...

Surviving in the Connected Home

David Emm | Posted 30.11.2015 | UK Tech
David Emm

Our homes are filled with an ever growing number of connected devices, but just how safe are our coffeemakers, smart meters or baby monitors from cyber-intruders?

Don't Hound the Hackers - Question Our Inability to Engage Them

Gi Fernando | Posted 30.10.2015 | UK Tech
Gi Fernando

Young people like Aaron Sterrit are capable of breaking down security walls, but they are also capable of making them stronger. The proverbial bike thief employed by the police to help identify top spots for bike theft has become the young digital pro who can spot the cracks in a firewall.

Putting Security at the Heart of 'Smart Cities'

Gary Newe | Posted 17.09.2016 | UK Tech
Gary Newe

The phrase "Cities of the Future" conjures up so many different images, from the utopia of The Jetsons to the dystopia of Judge Dredd. But one thing that most agree on is the connected nature of our cities, with every aspect of life being connected to the internet, machines communicating with machines and with us.

Attracting Young People to Tech

Graham Welch | Posted 16.09.2016 | UK Tech
Graham Welch

The problem is that in the past we have not been doing enough to encourage young people to look at cybersecurity and tech as a viable career option. And with few youngsters studying related subjects at school and university, there are not enough qualified candidates to fill the vacancies.

How to Protect Yourself Against the Hackers

Gary Newe | Posted 02.09.2016 | UK Tech
Gary Newe

The number of data breaches has continued to grow in 2015. Barely a day goes by without a company or country falling victim to a cyber-security attack. Some of the high profile attacks we've witnessed this year include Github, Uber, and Chris Froome's personal training data.

Beware the All-Knowing App

Graham Welch | Posted 08.07.2016 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 18.06.2016 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

You Could Soon Log Into Your Bank Using Just Emojis

The Huffington Post UK | Nitya Rajan | Posted 15.06.2015 | UK Tech

The humble emoji could soon replace numerical passwords and make for safer online banking practices, according to British software company Intelligent...

What Happens After a Cyberattack?

Graham Welch | Posted 19.05.2016 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

A Professional Hacker Claims He Took Control Of An Entire Passenger Plane

The Huffington Post UK | Thomas Tamblyn | Posted 19.05.2015 | UK Tech

The FBI are investigating claims by aerospace security expert Chris Roberts that he was able to hack into an aeroplane's cockpit and take control of t...

Love Letter for You

Graham Welch | Posted 04.05.2016 | UK Tech
Graham Welch

All that has changed now and cyberattacks are no longer the work of individuals seeking notoriety, they tend to be organised gangs or state sponsored, well funded, highly sophisticated and targeted and in most cases they have strong financial motivations. In fact, some claim that cybercrime is now more profitable than drug trafficking.

Mind the Cyber Gap

Graham Welch | Posted 28.06.2015 | UK Tech
Graham Welch

In the bygone, romantic age of steam mechanical failure, a stray farm animal on the line or severe weather would have been enough to bring a train to a halt, but today there is much greater threat to the modern railway - cyber crime.

Don't Get Dazzled by the Shiny New Threat

Graham Welch | Posted 16.06.2015 | UK Tech
Graham Welch

The reality is that while new threats and headlines catch our attention and dazzle us all - the majority of cyberattacks taking place today around the world are using tried and test techniques which exploit often well-known risks and vulnerabilities.

Criminals Shopping for Your Data

Graham Welch | Posted 30.05.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

A World of Mobile Delights - and Dangers

Graham Welch | Posted 03.05.2015 | UK Tech
Graham Welch

As the transition away from relatively easy to manage corporate laptops and desk-bound computers, personal tablets and smartphones gathers pace, it's no surprise that hackers are choosing these mobile devices as their next target.

People Remain the Weakest Link in Security

Graham Welch | Posted 05.05.2015 | UK Tech
Graham Welch

The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent.

Mass Police Raids On UK Hackers

The Huffington Post UK/PA | Posted 06.03.2015 | UK Tech

A suspected hacker from Britain has been arrested in connection with an alleged cyber attack on the United States Department of Defence (DoD) as part ...

Is It Time for That Spring Cleaning?

Graham Welch | Posted 26.04.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.

Data, data, everywhere...

Graham Welch | Posted 13.04.2015 | UK Tech
Graham Welch

While smart phones, tablets and laptops are becoming our 'go-to' devices, creating a boon in productivity, the move towards Bring Your Own Device is increasing security risk to the corporate network and corporate data.

The Worst Password List Is Here

The Huffington Post UK | Thomas Tamblyn | Posted 21.01.2015 | UK Tech

How secure is your password? The likelihood is that at the very least, it could probably do with a few symbols. At the very worst, you could find your...