Cybercrime

Beware the All-Knowing App

Graham Welch | Posted 10.07.2015 | UK Tech
Graham Welch

Do you ever check what permissions the apps you download to your smartphone or tablet require? Just why is it your torch app needs access to your contact lists and location? Or why your calendar needs to access your phone records?

Seven Everyday Cyber Threats to Look Out For

Graham Welch | Posted 19.06.2015 | UK Tech
Graham Welch

High-profile cyberattacks against major corporations and governments may be the ones making the headlines these days but cybercriminals are also still exploiting those basic online scamming techniques they have been perfecting for years.

Catching the Big Phish: What Are the Security Risks Facing Financial Organisations?

David Emm | Posted 18.06.2015 | UK Tech
David Emm

With this week being London Technology Week, it seems an appropriate time to raise awareness of these threats so that everyone can use technology with a much lower risk of becoming a victim of cybercrime.

What Happens After a Cyberattack?

Graham Welch | Posted 21.05.2015 | UK Tech
Graham Welch

Around this time last year a large online auction website went public to announce they had been breached and millions of customer records were compromised. They were not alone, 2014 was marked by high-profile cyberattacks to high street and online retailers. Immediately after the attack, most companies asked their customers to change their passwords, either as a security fix or as a precaution, but is it enough?

The Cyber Manifesto

Raj Samani | Posted 13.05.2015 | UK Tech
Raj Samani

Although not a major topic in the campaign spotlight, we did see all of the major parties provide measures to attempt to address the growth in cybercrime in their respective manifestos.

The Global Fight Against Cybercrime

David Emm | Posted 29.06.2015 | UK Tech
David Emm

In today's connected world we are hugely dependent on IT. This is true of our personal lives: the majority of us now own multiple connected devices - traditional desktop computers, laptops, tablets and smartphones.

Mind the Cyber Gap

Graham Welch | Posted 28.06.2015 | UK Tech
Graham Welch

In the bygone, romantic age of steam mechanical failure, a stray farm animal on the line or severe weather would have been enough to bring a train to a halt, but today there is much greater threat to the modern railway - cyber crime.

Criminals Shopping for Your Data

Graham Welch | Posted 30.05.2015 | UK Tech
Graham Welch

Loss of trust, though, goes far beyond the cost of lost orders and visitors; many studies have concluded that businesses that suffer a significant data breach or hack experience record drops in innovation and staff numbers as a result.

10 Steps to Mitigate a DDoS Attack in Real Time

Gary Newe | Posted 20.05.2015 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

A Month in the Life of the Fight Against Cybercrime

David Emm | Posted 09.05.2015 | UK Tech
David Emm

Once inside the system, hackers are able to move around the system until they find their points of interest - staff and processes that allow them to extract money from the infected system. The worrying thing is that this attack is still active.

People Remain the Weakest Link in Security

Graham Welch | Posted 05.05.2015 | UK Tech
Graham Welch

The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent.

How to Protect Yourself by Thinking Like a Criminal

Simon Specka | Posted 28.04.2015 | UK Tech
Simon Specka

Free public WiFi is one of the hallmarks of our times. So addicted are we to staying connected, we can barely bear to be offline nowadays - mobile professionals, students and the growing army of freelance creatives are drawn to free WiFi, served by cafes and bars, like bees to a honeypot.

Is It Time for That Spring Cleaning?

Graham Welch | Posted 26.04.2015 | UK Tech
Graham Welch

After this is all done, remediation should be performed to bring all systems up to date with the latest patches, but not before creating a change management process to help with versioning control and documentation.

How Do You Steal $1Bn? You Never Leave Your Room

The Huffington Post UK | Thomas Tamblyn | Posted 16.02.2015 | UK Tech

A criminal organisation has managed to steal $1bn from banks all over the world in what security experts are calling "the most sophisticated attack th...

Data, data, everywhere...

Graham Welch | Posted 13.04.2015 | UK Tech
Graham Welch

While smart phones, tablets and laptops are becoming our 'go-to' devices, creating a boon in productivity, the move towards Bring Your Own Device is increasing security risk to the corporate network and corporate data.

SWAT Prank Caller Could Get Five Years In Jail

The Huffington Post UK | Thomas Tamblyn | Posted 09.02.2015 | UK Tech

A 19 year old gamer is behind bars in Nevada accused of orchestrating a 'swatting' incident which saw armed police raid a victim's house, mistakenly u...

10 Ways to Get Arrested for Using the Internet

AllTime10s | Posted 27.01.2015 | UK Tech

Think you're safe behind your computer screen? Well, think again. Watch this to discover the people who've been arrested for unfortunate tweets, statu...

Hackers Hack Hackers

The Huffington Post UK | Thomas Tamblyn | Posted 20.01.2015 | UK Tech

The hacking group Lizard Squad has reportedly been hacked into with thousands in Bitcoins stolen and the group's customer database leaked online. I...

Power of a Password

David Emm | Posted 18.02.2015 | UK Tech
David Emm

As a parting thought, check also to see if the web site provider offers a two-step verification method to protect your account details (e.g. requiring an additional one-time passcode, send via SMS to your mobile phone, in order to modify your account settings). This will further secure your account.

Cybersecurity: 'Be Paranoid - It helps'

Caroline Hyde | Posted 11.02.2015 | UK Tech
Caroline Hyde

Well, in the news they seem to be....and doesn't Sony know it. It is the latest big company to be thrown into the media spotlight as a result of highly embarrassing data breaches, reported to have occurred in both its Pictures and PlayStation units.

Prepare for the Festive IT Headache

Graham Welch | Posted 06.02.2015 | UK Tech
Graham Welch

The holidays are a time for giving, we all know, and 2014 continues the trend of the past few years - one of the most popular gifts this year will be a new tablet, smartphone or laptop...

Is 2015 the Year for the Threat-centric Network?

Graham Welch | Posted 02.02.2015 | UK Tech
Graham Welch

As an old year comes to a close we often start to look for trends and predictions of what the New Year holds for us in business and especially those in cybersecurity who are increasingly at the forefront of defending the enterprise from the continual threat and reality of cybercrime.

North Korea Wants Revenge For Seth Rogan's New Film

The Huffington Post UK | Thomas Tamblyn | Posted 01.12.2014 | UK Tech

Sony Pictures Entertainment is now considering the possibility that its catastrophic hacking attack could have originated from North Korea as revenge ...

Spycam Hacking Shock

Graham Welch | Posted 21.01.2015 | UK Tech
Graham Welch

What shocked me about this story was not that this happens, but that people are surprised it has and we have failed to take even the most basic security steps like setting a password when connecting cameras and monitors to the Internet.

Connectivity Everywhere

Graham Welch | Posted 03.01.2015 | UK Tech
Graham Welch

Everyone knows that in today's world we have never been so connected. The Internet is a part of most of our lives at work and at play every day. Indeed ask most teenagers and they will consider the Internet as being almost as important as the air that they breathe!