Cracking the Code to a Career in Cyber Security

Karen Price | Posted 14.04.2014 | UK Universities & Education
Karen Price

Every day thousands of people are working to defend UK businesses and citizens from crippling cyber attacks, including fraud and terrorism. Online crime has reached epic proportions, yet we are ill-equipped to fight the battle due to severe skills shortages and an ageing workforce...

Demystifying TOR

David Emm | Posted 11.03.2014 | UK Tech
David Emm

Tor (short for The Onion Router) is software designed to allow someone to remain anonymous when accessing the Internet. It has been around for some time, but for many years was used mainly by experts and enthusiasts. However, Edward Snowden's revelations have resulted in a surge of interest in Tor as more people seek online anonymity.

Energy Firm Cyber-defence Too Weak

Graham Welch | Posted 04.03.2014 | UK Tech
Graham Welch

Why are these critical infrastructure companies failing these tests? After all most of these large organizations are serious about cybersecurity. They run specialized departments tasked with protecting two key networks: data center (servers) and office automation (workstations).

Security for the Internet of Things

Graham Welch | Posted 25.02.2014 | UK Tech
Graham Welch

It is happening already and today you need to manage the whole attack continuum - before, during and after an attack. Only then can you hope to regain some of the initiative and ensure that damage to reputation and customer data is minimized, uncovered and remediated as quickly as possible.

Tackling Trafficking on a Global Scale

Joanne Taylor | Posted 28.03.2014 | UK Tech
Joanne Taylor

The upsurge in human trafficking over recent years is one of the saddest and most serious aspects of the on-going globalisation of crime. Here we assess the scale of the problem and look at how technology can be employed to address it.

What Is the Hardest Conversation You Have Had to Say?

Graham Welch | Posted 26.03.2014 | UK Tech
Graham Welch

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

iPhones Change the Business Landscape

Graham Welch | Posted 15.03.2014 | UK Tech
Graham Welch

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

'Tis the Season for Predictions...

Graham Welch | Posted 11.02.2014 | UK Tech
Graham Welch

Cybercrime today is not like the early days of virus writers and hackers who bragged about their exploits with friends. Today cybercrime is a serious business where actually most hackers do not want to be noticed as the longer they remain hidden in the network and are free to conduct their operations, the more information they can steal and the more money they can make.

Follow the Money

Christian Berg | Posted 25.01.2014 | UK Tech
Christian Berg

Follow the money; an old investigative adage that says the money trail will ultimately lead to those at the heart of a crime. However, does this hold for all crimes? Particularly those online or those possessed of an extremely skewed value system.

The Weakest Link in Cyber Security - Staff

Graham Welch | Posted 25.01.2014 | UK Tech
Graham Welch

It seems people cannot stop themselves clicking on links they receive in emails without even the most cursory check on whether it is a valid link or not. It is an easy step often overlooked that you hover your mouse over the link and see what web address it is trying to send you to.

What If the Man in the Café Is Also a 'Man-in-the-middle'?

David Emm | Posted 23.01.2014 | UK Tech
David Emm

Think about it. You never know what the guy with the laptop at the next table might be doing. Maybe, like you, he's checking his email, updating his Facebook page or chatting with friends. But maybe he's sniffing the Internet traffic of everyone around him - including yours.

Testing Times for UK Banks

Graham Welch | Posted 23.01.2014 | UK Tech
Graham Welch

For years the cyber security industry has talked about the latest silver bullet that will protect against the latest threat. But the sad fact is despite millions of pounds being spent to protect institutions around the world, cyber attacks seemingly continue day after day.

British Man Charged With Hacking Into Nasa

PA/Huffington Post UK | Posted 28.10.2013 | UK

A British hacker has been charged with breaking into the computer systems of the US army, Nasa and other federal agencies. The 28-year-old, named a...

Cyber Warfare: The Modern Cold War?

Peter Armstrong | Posted 23.01.2014 | UK Tech
Peter Armstrong

It's difficult to imagine how cyber warfare could wreak the same havoc as traditional, conventional war. But as former director of national intelligence Mike McConnell once noted, cyber war has the potential to mirror the nuclear challenge - less in the physical sense, but in terms of the potential economic and psychological effects.

Post-Snowden, Encryption Remains Your Best Friend

Ian Emery | Posted 17.11.2013 | UK Tech
Ian Emery

Let's start by assuming that if state agencies really want to carry out surveillance of your systems they will. All you can do is make it less worth their while trying.

Follow the Money

Graham Welch | Posted 09.10.2013 | UK Tech
Graham Welch

For most of today's cybercriminals their activities are not a hobby to brag about with mates. What they do is a serious business to them and they employ many of the best 'traditional' business practices mainstream companies use with the goal of making money. Today's cybercriminal gangs are highly professional and motivated.

Going Retro in the World of Digital

Graham Welch | Posted 17.09.2013 | UK Tech
Graham Welch

Security is now a question of trying to think like the attacker and assume that something bad will eventually happen. Today knowing what you are going to do before, during and after the attack is the thing that will make the difference and lessen the embarrassment and damage a breach could ultimately cause.

Down at the Watering-Hole

David Emm | Posted 07.09.2013 | UK Tech
David Emm

Drive-by downloads are a common method used to spread malware. Cybercriminals look for insecure web sites and plant a malicious script into HTTP or PHP code on one of the web pages. This script may install malware directly onto the computer of someone who visits the site, or it may take the form of an IFRAME that re-directs the victim to a site controlled by the cybercriminals.

Please Switch Off Your Electronic Devices.....

Graham Welch | Posted 02.09.2013 | UK Tech
Graham Welch

why is it we seem to value physical over digital so much? We often act very much more recklessly in the digital world than the physical. After all how many of us have taken directions from a friend or colleague to visit a certain website without a second thought? Few people take the trouble to check the validity of the website we are visiting before we go there, or even know what to look for.

They're After You: Five Tips for Dodging Cyber Criminals

Allen Scott | Posted 01.09.2013 | UK Tech
Allen Scott

In a world where we often spend more time online than we do in the 'real world' we will all make IT security mishaps at some point. Statistics from Experian Hitwise revealed that the UK spent 37 billion hours online last year. 1 The question is, how many of these hours were spent securely?

Online Security - Whose Responsibility?

David Emm | Posted 25.08.2013 | UK Tech
David Emm

Whose responsibility is it to ensure that we stay safe online? Government? Businesses? Security vendors? You and me? I believe that it's a shared responsibility.

Keeping Your Passwords Secure

David Emm | Posted 04.08.2013 | UK Tech
David Emm

Passwords, passwords, passwords! There's no escape! You need them to bank online. You need them to log in to the many social networks you use. You need them to pay bills. So it's little wonder that many of us decide to use the same password for everything.

iPhone Hacked In 60 Seconds By Modified Charger

Huffington Post UK | Michael Rundle | Posted 03.08.2013 | UK Tech

Researchers have reportedly been able to install dangerous hacking software onto an iPhone in less than a minute using a modified charger. The team...

The Soviet Union's Internet Domain Still Exists, Is 'Haven' For Criminals

Huffington Post UK | Michael Rundle | Posted 03.08.2013 | UK Tech

An old corner of the internet once controlled by the Soviet Union has become a "haven" for hackers, security experts have said. According to the As...

SMBs Expect Lenders to Cover Cybercrime Losses - Don't Bank On It!

Mike Foreman | Posted 30.07.2013 | UK Tech
Mike Foreman

The most common threat to businesses is virus infection says the FSB, which 20 per cent of respondents said they have fallen victim to. A further eight per cent have been a victim of hacking, while five per cent have suffered security breaches.