UK Cybercrime

The Cost Of Data Breaches Will Get Even Higher

Alastair Paterson | Posted 24.10.2016 | UK Tech
Alastair Paterson

Clearly companies, both large and small, need to act now and start putting in place robust standards and procedures to counter the cyber security threat, or face the prospect of paying drastically increased costs in regulatory fines, as well as the reputational harm to their brand.

Hackers Broke The Internet This Weekend Using Your Home Gadgets As A Weapon

The Huffington Post | Thomas Tamblyn | Posted 24.10.2016 | UK Tech

A major cyberattack took place over the weekend, it was targeted at a company called Dyn and while you’ve probably never heard of them until now, th...

UK Spy Agencies 'Unlawfully' Collected Your Personal Data For Over A Decade

Press Association | Thomas Tamblyn | Posted 18.10.2016 | UK Tech

The UK’s spy agencies including MI5, MI6 and GCHQ breached privacy rules by spending 10 years collecting vast amounts of personal information. Senio...

Cybercriminals Are Launching Web Attacks Using Armies Of Hacked Devices

The Huffington Post | Oscar Williams | Posted 30.09.2016 | UK Tech

Cyber-criminals are building vast networks of hacked devices to launch web attacks of unprecedented force. Web hosting company OVH was recently knocke...

A Hacker's Eye View: Targeted Attacks - Part One

Lawrence Munro | Posted 28.09.2016 | UK Tech
Lawrence Munro

The risk of a cyber-attack has become an unfortunate fact of life in today's digital world. However, while businesses of all sizes and in all sectors should certainly be aware they are under threat, just like all thieves, cyber criminals have their preferred targets and methods.

Yahoo Admits A Staggering Half A BILLION Accounts Were Stolen In 2014

Press Association | Thomas Tamblyn | Posted 23.09.2016 | UK Tech

Yahoo has confirmed that a data breach took place in 2014 which resulted in the theft of information from 500 million user accounts. Claiming the atta...

Is Your Webcam Or Baby Monitor Being Hacked? Find Out And Protect Yourself

The Huffington Post | Thomas Tamblyn | Posted 22.09.2016 | UK Tech

Imagine walking into your child’s bedroom and hearing a strange voice coming through your baby monitor. It’s a terrifying thought and yet accordin...

Cybercrime And Cyber-punishment

Mark Piggott | Posted 16.09.2016 | UK Comedy
Mark Piggott

The digital age brings new freedoms, new convenience, but also new irritations - and new forms of crime. The world of justice struggles to keep up wit...

What Is The "Pegasus" iPhone Spyware And Why Was It So Dangerous?

The Huffington Post | Thomas Tamblyn | Posted 26.08.2016 | UK Tech

For almost every iPhone owner on the planet, their only connection with the “Pegasus” spyware will be in the form of a critical iOS update which A...

Apple Issues Critical iOS Update After Unprecedented 'Mobile Espionage' Malware Discovered

The Huffington Post | Thomas Tamblyn | Posted 26.08.2016 | UK Tech

It’s the stuff of a spy movie or video game: A shady government agency simply clicks a button and immediately has access to everything on your phone...

Welcome To The Hotel Malware

Alastair Paterson | Posted 24.08.2016 | UK Tech
Alastair Paterson

Our data is at risk and increasingly professional hackers target the connected devices we all rely on at home and in business, as they are often the weak spot in our cyber defenses extending our digital footprint even further into the web.

A Future Where Hackers Can Control Your Thoughts And Feelings Isn't Far Away

The Huffington Post | Thomas Tamblyn | Posted 24.08.2016 | UK Tech

An Oxford PhD candidate has warned of a future that sounds like something out of a science fiction film: A world where hackers will be able to control...

Blogger Gets Revenge On Cyber-Scammer By Sending Him A Virus

The Huffington Post | Oscar Williams | Posted 16.08.2016 | UK Tech

A French security researcher claims to have got his own back on scammers by sending them a virus after they tried to trick him into buying bogus softw...

80 Per Cent Of All Android Phones And Tablets Could Be Hijacked By This Bug

The Huffington Post | Thomas Tamblyn | Posted 16.08.2016 | UK Tech

A serious bug has been discovered in Google’s Android operating system that could affect around 80 per cent of all devices running the software. The...

900 Million Android Phones Could Be Vulnerable To A New Hack

The Huffington Post | Thomas Tamblyn | Posted 08.08.2016 | UK Tech

A serious security flaw has been discovered in millions of Android phones that could give hackers complete access to the device’s data, say security...

Pornhub Gets Hacked, Revealing Users' Preferences

The Huffington Post | Thomas Tamblyn | Posted 26.07.2016 | UK Tech

Pornhub, one of the world’s largest porn sites has had its website hacked, revealing millions of users’ personal preferences. Before you start fur...

Cybercriminals Are 'Outpacing The UK's Collective Response'

Press Association | Oscar Williams | Posted 07.07.2016 | UK Tech

Cybercriminals are scaling their technical capabilities so quickly that UK law enforcement and businesses can’t keep up, the National Crime Agency (...

Criminal Children: Could Your Teenager Be a Hacker?

David Emm | Posted 23.02.2016 | UK Tech
David Emm

There are some signs parents can look for to assess whether their children are getting involved in dangerous activities online - here are some questions to consider...

The Government Wants To Give You Police-Style Powers To Fight Cyber Crime

The Huffington Post UK | Nitya Rajan | Posted 21.01.2016 | UK Tech

Volunteers are set to receive "police-style" powers in a bid to boost the fight against cyber crime, the Government has announced. Under the new m...

Hacking Our Health

David Emm | Posted 08.12.2015 | UK Tech
David Emm

Everything is becoming more connected: not just traditional computers, but household objects such as fridges, TVs and central heating systems - and even us. Gartner recently predicted that there will be 21 billion 'Internet of Things' (IoT) devices in use by 2020.

The Battle Against Cybercrime Continues

David Emm | Posted 25.11.2015 | UK Tech
David Emm

Such high-profile attacks make it clear that hackers are continually looking for new ways to conduct cybercrime, based on society's ever-growing dependence on the Internet. The vulnerability of confidential information only amplifies the threat.

Virtual Behaviour: Where Do the Boundaries Lie?

Christian Berg | Posted 12.11.2015 | UK Tech
Christian Berg

The nature of the Internet means that people behave as they please, and not necessarily how they would do in real life. Individuals link being anonymous to being undetectable and therefore they feel as if they are not accountable for their actions online. This is where we start to see the destructive side effects of anonymity come into play.

McFly and Doc Never Saw Cybercrime Coming

Graham Welch | Posted 20.10.2016 | UK Tech
Graham Welch

If we want to keep on the path of creating technology seen in sci-fi films, and not horror ones, we all need to bring our concepts of cybersecurity to the 21st century.

Attracting Young People to Tech

Graham Welch | Posted 16.09.2016 | UK Tech
Graham Welch

The problem is that in the past we have not been doing enough to encourage young people to look at cybersecurity and tech as a viable career option. And with few youngsters studying related subjects at school and university, there are not enough qualified candidates to fill the vacancies.

Top Five Ways to Increase Your Cybersecurity

Roger Keenan | Posted 01.09.2016 | UK Tech
Roger Keenan

It's official - digitisation has taken over our lives. With there now being more mobile devices than humans on earth and even fridges and kettles being connected to the internet, it's sadly inevitable that malicious organisations will attempt to access our data.