Cybercrime

How to Protect Yourself by Thinking Like a Criminal

Simon Specka | Posted 02.03.2015 | UK Tech
Simon Specka

Free public WiFi is one of the hallmarks of our times. So addicted are we to staying connected, we can barely bear to be offline nowadays - mobile professionals, students and the growing army of freelance creatives are drawn to free WiFi, served by cafes and bars, like bees to a honeypot.

Is It Time for That Spring Cleaning?

Graham Welch | Posted 25.02.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.

How Do You Steal $1Bn? You Never Leave Your Room

The Huffington Post UK | Thomas Tamblyn | Posted 16.02.2015 | UK Tech

A criminal organisation has managed to steal $1bn from banks all over the world in what security experts are calling "the most sophisticated attack th...

Data, data, everywhere...

Graham Welch | Posted 12.02.2015 | UK Tech
Graham Welch

While smart phones, tablets and laptops are becoming our 'go-to' devices, creating a boon in productivity, the move towards Bring Your Own Device is increasing security risk to the corporate network and corporate data.

SWAT Prank Caller Could Get Five Years In Jail

The Huffington Post UK | Thomas Tamblyn | Posted 09.02.2015 | UK Tech

A 19 year old gamer is behind bars in Nevada accused of orchestrating a 'swatting' incident which saw armed police raid a victim's house, mistakenly u...

10 Ways to Get Arrested for Using the Internet

AllTime10s | Posted 27.01.2015 | UK Tech

Think you're safe behind your computer screen? Well, think again. Watch this to discover the people who've been arrested for unfortunate tweets, statu...

Hackers Hack Hackers

The Huffington Post UK | Thomas Tamblyn | Posted 20.01.2015 | UK Tech

The hacking group Lizard Squad has reportedly been hacked into with thousands in Bitcoins stolen and the group's customer database leaked online. I...

Power of a Password

David Emm | Posted 18.02.2015 | UK Tech
David Emm

As a parting thought, check also to see if the web site provider offers a two-step verification method to protect your account details (e.g. requiring an additional one-time passcode, send via SMS to your mobile phone, in order to modify your account settings). This will further secure your account.

Cybersecurity: 'Be Paranoid - It helps'

Caroline Hyde | Posted 11.02.2015 | UK Tech
Caroline Hyde

Well, in the news they seem to be....and doesn't Sony know it. It is the latest big company to be thrown into the media spotlight as a result of highly embarrassing data breaches, reported to have occurred in both its Pictures and PlayStation units.

Prepare for the Festive IT Headache

Graham Welch | Posted 06.02.2015 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 02.02.2015 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

North Korea Wants Revenge For Seth Rogan's New Film

The Huffington Post UK | Thomas Tamblyn | Posted 01.12.2014 | UK Tech

Sony Pictures Entertainment is now considering the possibility that its catastrophic hacking attack could have originated from North Korea as revenge ...

Spycam Hacking Shock

Graham Welch | Posted 21.01.2015 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 03.01.2015 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

Get Safe Online

David Emm | Posted 23.12.2014 | UK Tech
David Emm

Many people assume that they won't fall victim to an online attack, but anyone could be a victim to cybercrime. So, this week is one where we can all take stock of our online behaviour and make sure we are not becoming complacent.

100 Mr Big's Control Cybercrime

Graham Welch | Posted 19.12.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

Just 100 People Carry Out Almost All The World's Internet Crime

The Huffington Post UK | Thomas Tamblyn | Posted 14.10.2014 | UK Tech

The head of Europol's Cybercrime Centre has told the BBC that the large majority of all cybercrime is carried out by just 100 highly-trained individua...

Real Life Imitating Art

David Emm | Posted 03.12.2014 | UK Tech
David Emm

The current mechanisms for real-time tracking, detection, analysis and resolution of cyber-threats for computers and mobile devices will not be enough on their own - it could take just seconds to disable or destroy a connected vehicle, with disastrous consequences.

Online Dating... The Scams That Target Men

David Emm | Posted 26.10.2014 | UK Tech
David Emm

In the hunt for company, many men are putting themselves at risk, becoming an unwitting target for scammers and cyber-thieves... The world of online dating has always drawn the attention of fraudsters, since it offers a large pool of potential victims.

Heads in the Sand When It Comes to Small Business Security

David Emm | Posted 28.09.2014 | UK Tech
David Emm

It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target small as well as large businesses.

Demystifying the Shylock Trojan

David Emm | Posted 21.09.2014 | UK Tech
David Emm

Shylock is designed to steal online banking credentials from the PCs of its victims... Shylock first appeared in 2011, aimed mainly at victims in the UK, but subsequently spread to other countries within Europe and to the United States.

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

A Week of Cyber Attacks - What Can Be Done?

Gary Newe | Posted 13.08.2014 | UK Tech
Gary Newe

DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.