Cybercrime

What Is The "Pegasus" iPhone Spyware And Why Was It So Dangerous?

The Huffington Post | Thomas Tamblyn | Posted 26.08.2016 | UK Tech

For almost every iPhone owner on the planet, their only connection with the “Pegasus” spyware will be in the form of a critical iOS update which A...

Apple Issues Critical iOS Update After Unprecedented 'Mobile Espionage' Malware Discovered

The Huffington Post | Thomas Tamblyn | Posted 26.08.2016 | UK Tech

It’s the stuff of a spy movie or video game: A shady government agency simply clicks a button and immediately has access to everything on your phone...

Welcome To The Hotel Malware

Alastair Paterson | Posted 24.08.2016 | UK Tech
Alastair Paterson

Our data is at risk and increasingly professional hackers target the connected devices we all rely on at home and in business, as they are often the weak spot in our cyber defenses extending our digital footprint even further into the web.

A Future Where Hackers Can Control Your Thoughts And Feelings Isn't Far Away

The Huffington Post | Thomas Tamblyn | Posted 24.08.2016 | UK Tech

An Oxford PhD candidate has warned of a future that sounds like something out of a science fiction film: A world where hackers will be able to control...

Blogger Gets Revenge On Cyber-Scammer By Sending Him A Virus

The Huffington Post | Oscar Williams | Posted 16.08.2016 | UK Tech

A French security researcher claims to have got his own back on scammers by sending them a virus after they tried to trick him into buying bogus softw...

80 Per Cent Of All Android Phones And Tablets Could Be Hijacked By This Bug

The Huffington Post | Thomas Tamblyn | Posted 16.08.2016 | UK Tech

A serious bug has been discovered in Google’s Android operating system that could affect around 80 per cent of all devices running the software. The...

900 Million Android Phones Could Be Vulnerable To A New Hack

The Huffington Post | Thomas Tamblyn | Posted 08.08.2016 | UK Tech

A serious security flaw has been discovered in millions of Android phones that could give hackers complete access to the device’s data, say security...

Pornhub Gets Hacked, Revealing Users' Preferences

The Huffington Post | Thomas Tamblyn | Posted 26.07.2016 | UK Tech

Pornhub, one of the world’s largest porn sites has had its website hacked, revealing millions of users’ personal preferences. Before you start fur...

Cybercriminals Are 'Outpacing The UK's Collective Response'

Press Association | Oscar Williams | Posted 07.07.2016 | UK Tech

Cybercriminals are scaling their technical capabilities so quickly that UK law enforcement and businesses can’t keep up, the National Crime Agency (...

Criminal Children: Could Your Teenager Be a Hacker?

David Emm | Posted 23.02.2016 | UK Tech
David Emm

There are some signs parents can look for to assess whether their children are getting involved in dangerous activities online - here are some questions to consider...

The Government Wants To Give You Police-Style Powers To Fight Cyber Crime

The Huffington Post UK | Nitya Rajan | Posted 21.01.2016 | UK Tech

Volunteers are set to receive "police-style" powers in a bid to boost the fight against cyber crime, the Government has announced. Under the new m...

Hacking Our Health

David Emm | Posted 08.12.2015 | UK Tech
David Emm

Everything is becoming more connected: not just traditional computers, but household objects such as fridges, TVs and central heating systems - and even us. Gartner recently predicted that there will be 21 billion 'Internet of Things' (IoT) devices in use by 2020.

The Battle Against Cybercrime Continues

David Emm | Posted 25.11.2015 | UK Tech
David Emm

Such high-profile attacks make it clear that hackers are continually looking for new ways to conduct cybercrime, based on society's ever-growing dependence on the Internet. The vulnerability of confidential information only amplifies the threat.

Virtual Behaviour: Where Do the Boundaries Lie?

Christian Berg | Posted 12.11.2015 | UK Tech
Christian Berg

The nature of the Internet means that people behave as they please, and not necessarily how they would do in real life. Individuals link being anonymous to being undetectable and therefore they feel as if they are not accountable for their actions online. This is where we start to see the destructive side effects of anonymity come into play.

McFly and Doc Never Saw Cybercrime Coming

Graham Welch | Posted 21.10.2015 | UK Tech
Graham Welch

If we want to keep on the path of creating technology seen in sci-fi films, and not horror ones, we all need to bring our concepts of cybersecurity to the 21st century.

Attracting Young People to Tech

Graham Welch | Posted 21.09.2015 | UK Tech
Graham Welch

The problem is that in the past we have not been doing enough to encourage young people to look at cybersecurity and tech as a viable career option. And with few youngsters studying related subjects at school and university, there are not enough qualified candidates to fill the vacancies.

Top Five Ways to Increase Your Cybersecurity

Roger Keenan | Posted 02.09.2015 | UK Tech
Roger Keenan

It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.

Transparency and Trust: What's Happening With Our Data?

David Emm | Posted 27.08.2016 | UK Tech
David Emm

Worryingly, many people use the same password and personal details across multiple online accounts, so if their details have been compromised by one attack they could find other online accounts suffer too.

Beware the All-Knowing App

Graham Welch | Posted 08.07.2016 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 18.06.2016 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

Catching the Big Phish: What Are the Security Risks Facing Financial Organisations?

David Emm | Posted 17.06.2016 | UK Tech
David Emm

With this week being London Technology Week, it seems an appropriate time to raise awareness of these threats so that everyone can use technology with a much lower risk of becoming a victim of cybercrime.

What Happens After a Cyberattack?

Graham Welch | Posted 19.05.2016 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

The Cyber Manifesto

Raj Samani | Posted 12.05.2016 | UK Tech
Raj Samani

Although not a major topic in the campaign spotlight, we did see all of the major parties provide measures to attempt to address the growth in cybercrime in their respective manifestos.

The Global Fight Against Cybercrime

David Emm | Posted 29.06.2015 | UK Tech
David Emm

In today's connected world we are hugely dependent on IT. This is true of our personal lives: the majority of us now own multiple connected devices - traditional desktop computers, laptops, tablets and smartphones.

Mind the Cyber Gap

Graham Welch | Posted 28.06.2015 | UK Tech
Graham Welch

In the bygone, romantic age of steam mechanical failure, a stray farm animal on the line or severe weather would have been enough to bring a train to a halt, but today there is much greater threat to the modern railway - cyber crime.