Cyberattacks

Children, Computing and the Curriculum

David Emm | Posted 12.09.2014 | UK Tech
David Emm

Online safety is a vital factor at every stage of our children's education. Children use the Internet differently at different ages. Just as the way maths is taught varies from key stage 1 to key stage 4, cyber-security must be approached in a way that will be most meaningful to the life of children at different ages.

Russian Group Hacking: What We Know and What We Can Learn

Gary Newe | Posted 07.08.2014 | UK Tech
Gary Newe

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.

Heads in the Sand When It Comes to Small Business Security

David Emm | Posted 30.07.2014 | UK Tech
David Emm

It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target small as well as large businesses.

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Users Have 'Two Weeks' To Protect Against Virus That Is 'Literally Extorting People'

The Huffington Post UK | Thomas Tamblyn | Posted 03.06.2014 | UK Tech

UK residents will have 'two weeks' to protect themselves against a 'powerful computer attack' that ransoms people's data, according to the National Cr...

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Security for the Internet of Things

Graham Welch | Posted 26.04.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

Testing Times for UK Banks

Graham Welch | Posted 23.01.2014 | UK Tech
Graham Welch

For years the cyber security industry has talked about the latest silver bullet that will protect against the latest threat. But the sad fact is despite millions of pounds being spent to protect institutions around the world, cyber attacks seemingly continue day after day.

Please Switch Off Your Electronic Devices.....

Graham Welch | Posted 02.09.2013 | UK Tech
Graham Welch

why is it we seem to value physical over digital so much? We often act very much more recklessly in the digital world than the physical. After all how many of us have taken directions from a friend or colleague to visit a certain website without a second thought? Few people take the trouble to check the validity of the website we are visiting before we go there, or even know what to look for.

Life Ain't Easy for a Boy Named Kim

Nick Abbot | Posted 17.05.2013 | UK Comedy
Nick Abbot

The evil imperialist American dogs cut off North Korea's internet feed this week. Or it could have been someone at Kim Jong-un's place accidentally kicked the plug out of the wall that links them to their dial-up connection.

Java Exploits - Do You Need to Be Worried?

David Emm | Posted 06.05.2013 | UK Tech
David Emm

The targeting of well-known and regularly used social networks such as Twitter and Facebook naturally make the headlines. But Java-based attacks are not solely aimed at large corporations - the issue of cybercrime can be much closer to home for all of us.

Demystifying Rocra

David Emm | Posted 26.03.2013 | UK Tech
David Emm

If you have stumbled across the phrase 'Red October' in the past few weeks, you may think it sounds like an operation from a John le Carré novel. In ...

Cybergeddon: Don't Keep Calm, But Carry On!

Dr Lynette Nusbacher | Posted 16.12.2012 | UK Tech
Dr Lynette Nusbacher

One of the great weaknesses of Western preparation for the strategic future of cyberspace is that we lack a coherent narrative for ordering and unders...

Scams Are a Sport This Summer

Raj Samani | Posted 03.10.2012 | UK Tech
Raj Samani

Email inboxes are highly predictable. Any newsworthy event, whether a natural disaster, major sporting event, or even celebrity gossip inevitably invokes an email from an entrepreneurial individual with unscrupulous principles promising you something of value in exchange for personal information...

Social Media: Friend or Foe?

Jacques Erasmus | Posted 25.09.2012 | UK Tech
Jacques Erasmus

Remember what your mother used to tell you about not speaking to strangers? Well in this technology-enhanced aged this sentiment also applies to your social media accounts.

PICTURES: Royal Navy's Biggest Ship Berthed At Greenwich For Olympics

PA/Huffington Post UK | Posted 04.05.2012 | UK

The Royal Navy's largest ship has sailed up the River Thames on Friday ahead of a major security exercise in preparation for the Olympic Games. HMS...

Anonymous: Weakness and Strength

Justin Crump | Posted 28.09.2011 | UK
Justin Crump

A few weeks ago the hacktivist group LulzSec - who previously rapidly disbanded as a police operation closed in on them - claimed to have re-formed. T...