Cybercrime

Online Dating... The Scams That Target Men

David Emm | Posted 27.08.2014 | UK Tech
David Emm

In the hunt for company, many men are putting themselves at risk, becoming an unwitting target for scammers and cyber-thieves... The world of online dating has always drawn the attention of fraudsters, since it offers a large pool of potential victims.

Heads in the Sand When It Comes to Small Business Security

David Emm | Posted 30.07.2014 | UK Tech
David Emm

It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target small as well as large businesses.

Demystifying the Shylock Trojan

David Emm | Posted 24.07.2014 | UK Tech
David Emm

Shylock is designed to steal online banking credentials from the PCs of its victims... Shylock first appeared in 2011, aimed mainly at victims in the UK, but subsequently spread to other countries within Europe and to the United States.

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

A Week of Cyber Attacks - What Can Be Done?

Gary Newe | Posted 13.08.2014 | UK Tech
Gary Newe

DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Thousands Of Children Investigated By Police For Social Media Use

The Huffington Post UK | Posted 29.05.2014 | UK

Nearly 2,000 children, including one as young as nine, have been investigated by police for abuse, harassment and bullying on social media in just thr...

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Silk Road Is Back And Busier Than Ever

The Huffington Post UK | Posted 01.05.2014 | UK

Six months after the FBI shut down the most notorious black market website imaginable, it's back and busier than ever. Once known as "the eBay for ...

Cracking the Code to a Career in Cyber Security

Karen Price | Posted 11.06.2014 | UK Universities & Education
Karen Price

Every day thousands of people are working to defend UK businesses and citizens from crippling cyber attacks, including fraud and terrorism. Online crime has reached epic proportions, yet we are ill-equipped to fight the battle due to severe skills shortages and an ageing workforce...

Demystifying TOR

David Emm | Posted 10.05.2014 | UK Tech
David Emm

Tor (short for The Onion Router) is software designed to allow someone to remain anonymous when accessing the Internet. It has been around for some time, but for many years was used mainly by experts and enthusiasts. However, Edward Snowden's revelations have resulted in a surge of interest in Tor as more people seek online anonymity.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 03.05.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 26.04.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

Tackling Trafficking on a Global Scale

Joanne Taylor | Posted 28.03.2014 | UK Tech
Joanne Taylor

The upsurge in human trafficking over recent years is one of the saddest and most serious aspects of the on-going globalisation of crime. Here we assess the scale of the problem and look at how technology can be employed to address it.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

Follow the Money

Christian Berg | Posted 25.01.2014 | UK Tech
Christian Berg

Follow the money; an old investigative adage that says the money trail will ultimately lead to those at the heart of a crime. However, does this hold for all crimes? Particularly those online or those possessed of an extremely skewed value system.

The Weakest Link in Cyber Security - Staff

Graham Welch | Posted 25.01.2014 | UK Tech
Graham Welch

It seems people cannot stop themselves clicking on links they receive in emails without even the most cursory check on whether it is a valid link or not. It is an easy step often overlooked that you hover your mouse over the link and see what web address it is trying to send you to.

What If the Man in the Café Is Also a 'Man-in-the-middle'?

David Emm | Posted 23.01.2014 | UK Tech
David Emm

Think about it. You never know what the guy with the laptop at the next table might be doing. Maybe, like you, he's checking his email, updating his Facebook page or chatting with friends. But maybe he's sniffing the Internet traffic of everyone around him - including yours.

Testing Times for UK Banks

Graham Welch | Posted 23.01.2014 | UK Tech
Graham Welch

For years the cyber security industry has talked about the latest silver bullet that will protect against the latest threat. But the sad fact is despite millions of pounds being spent to protect institutions around the world, cyber attacks seemingly continue day after day.

British Man Charged With Hacking Into Nasa

PA/Huffington Post UK | Posted 28.10.2013 | UK

A British hacker has been charged with breaking into the computer systems of the US army, Nasa and other federal agencies. The 28-year-old, named a...

Cyber Warfare: The Modern Cold War?

Peter Armstrong | Posted 23.01.2014 | UK Tech
Peter Armstrong

It's difficult to imagine how cyber warfare could wreak the same havoc as traditional, conventional war. But as former director of national intelligence Mike McConnell once noted, cyber war has the potential to mirror the nuclear challenge - less in the physical sense, but in terms of the potential economic and psychological effects.