Cybercrime

10 Ways to Get Arrested for Using the Internet

AllTime10s | Posted 27.01.2015 | UK Tech

Think you're safe behind your computer screen? Well, think again. Watch this to discover the people who've been arrested for unfortunate tweets, statu...

Hackers Hack Hackers

The Huffington Post UK | Thomas Tamblyn | Posted 20.01.2015 | UK Tech

The hacking group Lizard Squad has reportedly been hacked into with thousands in Bitcoins stolen and the group's customer database leaked online. I...

Power of a Password

David Emm | Posted 19.12.2014 | UK Tech
David Emm

As a parting thought, check also to see if the web site provider offers a two-step verification method to protect your account details (e.g. requiring an additional one-time passcode, send via SMS to your mobile phone, in order to modify your account settings). This will further secure your account.

Cybersecurity: 'Be Paranoid - It helps'

Caroline Hyde | Posted 15.12.2014 | UK Tech
Caroline Hyde

Well, in the news they seem to be....and doesn't Sony know it. It is the latest big company to be thrown into the media spotlight as a result of highly embarrassing data breaches, reported to have occurred in both its Pictures and PlayStation units.

Prepare for the Festive IT Headache

Graham Welch | Posted 08.12.2014 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 05.12.2014 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

North Korea Wants Revenge For Seth Rogan's New Film

The Huffington Post UK | Thomas Tamblyn | Posted 01.12.2014 | UK Tech

Sony Pictures Entertainment is now considering the possibility that its catastrophic hacking attack could have originated from North Korea as revenge ...

Spycam Hacking Shock

Graham Welch | Posted 21.01.2015 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 03.01.2015 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

Get Safe Online

David Emm | Posted 23.12.2014 | UK Tech
David Emm

Many people assume that they won't fall victim to an online attack, but anyone could be a victim to cybercrime. So, this week is one where we can all take stock of our online behaviour and make sure we are not becoming complacent.

100 Mr Big's Control Cybercrime

Graham Welch | Posted 19.12.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

Just 100 People Carry Out Almost All The World's Internet Crime

The Huffington Post UK | Thomas Tamblyn | Posted 14.10.2014 | UK Tech

The head of Europol's Cybercrime Centre has told the BBC that the large majority of all cybercrime is carried out by just 100 highly-trained individua...

Real Life Imitating Art

David Emm | Posted 03.12.2014 | UK Tech
David Emm

The current mechanisms for real-time tracking, detection, analysis and resolution of cyber-threats for computers and mobile devices will not be enough on their own - it could take just seconds to disable or destroy a connected vehicle, with disastrous consequences.

Online Dating... The Scams That Target Men

David Emm | Posted 26.10.2014 | UK Tech
David Emm

In the hunt for company, many men are putting themselves at risk, becoming an unwitting target for scammers and cyber-thieves... The world of online dating has always drawn the attention of fraudsters, since it offers a large pool of potential victims.

Heads in the Sand When It Comes to Small Business Security

David Emm | Posted 28.09.2014 | UK Tech
David Emm

It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target small as well as large businesses.

Demystifying the Shylock Trojan

David Emm | Posted 21.09.2014 | UK Tech
David Emm

Shylock is designed to steal online banking credentials from the PCs of its victims... Shylock first appeared in 2011, aimed mainly at victims in the UK, but subsequently spread to other countries within Europe and to the United States.

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

A Week of Cyber Attacks - What Can Be Done?

Gary Newe | Posted 13.08.2014 | UK Tech
Gary Newe

DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Thousands Of Children Investigated By Police For Social Media Use

The Huffington Post UK | Posted 29.05.2014 | UK

Nearly 2,000 children, including one as young as nine, have been investigated by police for abuse, harassment and bullying on social media in just thr...

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Silk Road Is Back And Busier Than Ever

The Huffington Post UK | Posted 01.05.2014 | UK

Six months after the FBI shut down the most notorious black market website imaginable, it's back and busier than ever. Once known as "the eBay for ...

Cracking the Code to a Career in Cyber Security

Karen Price | Posted 11.06.2014 | UK Universities & Education
Karen Price

Every day thousands of people are working to defend UK businesses and citizens from crippling cyber attacks, including fraud and terrorism. Online crime has reached epic proportions, yet we are ill-equipped to fight the battle due to severe skills shortages and an ageing workforce...