Cybercrime

Cybersecurity: 'Be Paranoid - It helps'

Caroline Hyde | Posted 15.12.2014 | UK Tech
Caroline Hyde

Well, in the news they seem to be....and doesn't Sony know it. It is the latest big company to be thrown into the media spotlight as a result of highly embarrassing data breaches, reported to have occurred in both its Pictures and PlayStation units.

Prepare for the Festive IT Headache

Graham Welch | Posted 08.12.2014 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 05.12.2014 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

North Korea Wants Revenge For Seth Rogan's New Film

The Huffington Post UK | Thomas Tamblyn | Posted 01.12.2014 | UK Tech

Sony Pictures Entertainment is now considering the possibility that its catastrophic hacking attack could have originated from North Korea as revenge ...

Spycam Hacking Shock

Graham Welch | Posted 23.11.2014 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 04.11.2014 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!

Get Safe Online

David Emm | Posted 24.10.2014 | UK Tech
David Emm

Many people assume that they won't fall victim to an online attack, but anyone could be a victim to cybercrime. So, this week is one where we can all take stock of our online behaviour and make sure we are not becoming complacent.

100 Mr Big's Control Cybercrime

Graham Welch | Posted 19.12.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

Just 100 People Carry Out Almost All The World's Internet Crime

The Huffington Post UK | Thomas Tamblyn | Posted 14.10.2014 | UK Tech

The head of Europol's Cybercrime Centre has told the BBC that the large majority of all cybercrime is carried out by just 100 highly-trained individua...

Real Life Imitating Art

David Emm | Posted 03.12.2014 | UK Tech
David Emm

The current mechanisms for real-time tracking, detection, analysis and resolution of cyber-threats for computers and mobile devices will not be enough on their own - it could take just seconds to disable or destroy a connected vehicle, with disastrous consequences.

Online Dating... The Scams That Target Men

David Emm | Posted 26.10.2014 | UK Tech
David Emm

In the hunt for company, many men are putting themselves at risk, becoming an unwitting target for scammers and cyber-thieves... The world of online dating has always drawn the attention of fraudsters, since it offers a large pool of potential victims.

Heads in the Sand When It Comes to Small Business Security

David Emm | Posted 28.09.2014 | UK Tech
David Emm

It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target small as well as large businesses.

Demystifying the Shylock Trojan

David Emm | Posted 21.09.2014 | UK Tech
David Emm

Shylock is designed to steal online banking credentials from the PCs of its victims... Shylock first appeared in 2011, aimed mainly at victims in the UK, but subsequently spread to other countries within Europe and to the United States.

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

A Week of Cyber Attacks - What Can Be Done?

Gary Newe | Posted 13.08.2014 | UK Tech
Gary Newe

DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Thousands Of Children Investigated By Police For Social Media Use

The Huffington Post UK | Posted 29.05.2014 | UK

Nearly 2,000 children, including one as young as nine, have been investigated by police for abuse, harassment and bullying on social media in just thr...

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

Is the War of Cybercrime Really Lost?

Graham Welch | Posted 05.07.2014 | UK Tech
Graham Welch

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to just nine threats - meaning firms have continued to fall for the same types of scams and attacks all this time repeatedly.

Silk Road Is Back And Busier Than Ever

The Huffington Post UK | Posted 01.05.2014 | UK

Six months after the FBI shut down the most notorious black market website imaginable, it's back and busier than ever. Once known as "the eBay for ...

Cracking the Code to a Career in Cyber Security

Karen Price | Posted 11.06.2014 | UK Universities & Education
Karen Price

Every day thousands of people are working to defend UK businesses and citizens from crippling cyber attacks, including fraud and terrorism. Online crime has reached epic proportions, yet we are ill-equipped to fight the battle due to severe skills shortages and an ageing workforce...

Demystifying TOR

David Emm | Posted 10.05.2014 | UK Tech
David Emm

Tor (short for The Onion Router) is software designed to allow someone to remain anonymous when accessing the Internet. It has been around for some time, but for many years was used mainly by experts and enthusiasts. However, Edward Snowden's revelations have resulted in a surge of interest in Tor as more people seek online anonymity.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 03.05.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 26.04.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.