Cybersecurity

100 Mr Big's Control Cybercrime

Graham Welch | Posted 20.10.2014 | UK Tech
Graham Welch

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation of cybercrime today faced by businesses, governments and consumers, that relatively small numbers of common exploits and cybercrime tools are widely used by the professional gangs operating around the world.

Understanding the Attitudes and Behaviours of Internet Users in the Middle East

Damian Radcliffe | Posted 20.10.2014 | UK Tech
Damian Radcliffe

Compared to their global counterparts, online users in the Middle East are among the most enthusiastic about the positive impact that the Internet is having on their lives.

Online fraud - How Can We Protect Ourselves?

Gary Newe | Posted 08.10.2014 | UK Tech
Gary Newe

Whilst banks and financial institutions do their upmost to protect their customers, consumers do have a responsibility in the information they share. You are accountable for your own data and need to be careful what you do with it, how you share it and where you store it.

Who's Watching You?

David Emm | Posted 26.09.2014 | UK Tech
David Emm

Would you willingly invite a stranger into your bedroom while you're having sex or getting undressed, or into your bathroom while you're on the toilet? I assume the answer is 'No', but this could be the result if a cybercriminal were to hijack the camera on your mobile device.

'The Voice of Stray Dogs' Subjected to Harassment

Rita Pal | Posted 25.09.2014 | UK Tech
Rita Pal

He operates a system that has rescued more than 3000 dogs in 2 years with 400+ permanent dogs under his care. VoSD offers the highest standard of service and is equipped with the latest technology so that stray dogs get the best possible care.

Apple Just Did Something Amazing

Jon Geater | Posted 19.09.2014 | UK Tech
Jon Geater

Apple Pay, the contactless and in-app purchasing system announced by Apple this week... is not that amazing something.

Children, Computing and the Curriculum

David Emm | Posted 12.09.2014 | UK Tech
David Emm

Online safety is a vital factor at every stage of our children's education. Children use the Internet differently at different ages. Just as the way maths is taught varies from key stage 1 to key stage 4, cyber-security must be approached in a way that will be most meaningful to the life of children at different ages.

What Can We Learn From This Week's iCloud Incident?

Gary Newe | Posted 04.09.2014 | UK Tech
Gary Newe

This week has been a wakeup call to many individuals that hackers target individuals and businesses alike. What we must learn from it is that we are all responsible for our own data and we must all do what we can to secure it.

Online Dating... The Scams That Target Men

David Emm | Posted 27.08.2014 | UK Tech
David Emm

In the hunt for company, many men are putting themselves at risk, becoming an unwitting target for scammers and cyber-thieves... The world of online dating has always drawn the attention of fraudsters, since it offers a large pool of potential victims.

Russian Group Hacking: What We Know and What We Can Learn

Gary Newe | Posted 06.10.2014 | UK Tech
Gary Newe

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.

Identity Protection Still a Taboo for Most British Users

Alessandro Bonzio | Posted 04.10.2014 | UK Universities & Education
Alessandro Bonzio

"Your entire life is online... and it might be used against you"... The UK has one of the worst records in Europe in terms of cases of identity fraud. In 2012, as many as 25 percent of British citizens claimed to have been a target of identity theft at least once in their lives.

Heads in the Sand When It Comes to Small Business Security

David Emm | Posted 28.09.2014 | UK Tech
David Emm

It may be surprising to many people to learn just how at risk from cybercriminal activity even the smallest of businesses can be - fraud, banking Trojans, ransomware and phishing attacks all target small as well as large businesses.

Scotland, Security and the World

David Knowles | Posted 27.09.2014 | UK Politics
David Knowles

'It would be cataclysmic for Scotland to become independent, it would aid the forces of darkness, it would threaten the stability of the western world' These remarks, uttered way back in April by the former Secretary General of NATO George Robertson caused a political storm in Scotland.

Huge Military Investment Announced To Fight Britain's 'Unseen Enemies'

The Huffington Post UK/PA | Posted 14.07.2014 | UK

A huge investment is to be made in Britain's military to fight its "unseen enemies", including cyber attacks and terrorism. Prime Minister David C...

Sunscreen, Passport, Swimwear... Tablet

Graham Welch | Posted 27.08.2014 | UK Tech
Graham Welch

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

Don't Score an Own Goal With Security

Graham Welch | Posted 16.08.2014 | UK Tech
Graham Welch

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

World Cup... Prime Time for Cybercrime

Eric Ehrmann | Posted 08.08.2014 | UK Sport
Eric Ehrmann

With World Cup mania underway fans everwhere need to keep track of their smartphone. Cybercrime has become a pandemic and smartphone theft is where it all begins.

Small Business Has More at Stake Than Most

Mike Foreman | Posted 10.08.2014 | UK Tech
Mike Foreman

Unsurprisingly this caused widespread alarm among thousands of computer users everywhere. But it's small business that should pay closest attention because they have more at stake than most. It's not just that the safety of their financial data is crucial to their prosperity.

Is Trust the New Business Currency?

Graham Welch | Posted 06.08.2014 | UK Tech
Graham Welch

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

Skills Shortage in Cyber and Cloud?

Gary Newe | Posted 04.08.2014 | UK Tech
Gary Newe

A lot has been said about how technology is changing and the impact that is having on the way businesses operate and the way we live our lives. We're more mobile, we have the world's information available to us at the click of a button and our data is stored on interconnected servers spread throughout the world.

Users Have 'Two Weeks' To Protect Against Virus That Is 'Literally Extorting People'

The Huffington Post UK | Thomas Tamblyn | Posted 03.06.2014 | UK Tech

UK residents will have 'two weeks' to protect themselves against a 'powerful computer attack' that ransoms people's data, according to the National Cr...

New Study Finds Students Pay Little Attention to Digital Security

Alessandro Bonzio | Posted 04.08.2014 | UK Tech
Alessandro Bonzio

Digital security is still a relatively unfamiliar issue among university students; what's perhaps worse is that many of them don't even realize how little they know. More than 40 per cent admit not logging out after accessing an online service or having no password protecting their smartphone.

US Charges Five Chinese Officials In First Ever Cyber Espionage Case

The Huffington Post UK | Posted 19.05.2014 | UK

The US has handed down its first ever charges for cyber-espionage to five Chinese military officials, who are accused of hacking into American compani...

Is Anti-Virus Really Dead?

Graham Welch | Posted 13.07.2014 | UK Tech
Graham Welch

Despite 'snake oil' claims from many security product vendors, there are no silver bullets and security is no longer simply a question of building up the walls around your business, you need to have threat visibility across your entire enterprise and deal directly with the issue quickly and efficiently. Only by deploying a solution to execute on the entire lifecycle of the threat can you ensure you are protected before, during and after the attack.

In a Post-Snowden World, Can We Afford to Criticise Clarkson?

The Conversation UK | Posted 14.07.2014 | UK Politics
The Conversation UK

I have no idea whether he is racist, though I suspect he isn't. Intended or not, ill-used words do cause damage but it is the presence or absence of hateful intent behind such remarks rather than the words used that define the mindset of the speaker. We can't read minds so we interpret that intent, by proxy, from people's words...