UK Cybersecurity

Giving Google Your Mobile Number Could Make Your Gmail Account Less Secure, Expert Warns

The Huffington Post | Oscar Williams | Posted 21.10.2016 | UK Tech

If you’re a Gmail user, Google probably holds the keys to your digital life. Gmail accounts are full of emails, photos and documents and, through pa...

What Cybersecurity Experts Can Learn From The Gaming Industry

Ben Dickson | Posted 21.10.2016 | UK Tech
Ben Dickson

The cybersecurity industry seems to be heading toward dire straits as data breaches grow in size and number every year, while in tandem, monitoring networks is becoming ever more challenging with internet traffic increasing at an accelerating pace.

How To Keep The Fraudsters At Bay

Gad Elkin | Posted 21.10.2016 | UK Tech
Gad Elkin

In order to prevent online fraud, it is important for businesses to recognise where their infrastructure is most vulnerable, educate employees effectively and work with the right partners to keep up with an evolving cyber security landscape.

Biometrics - Gambling With Identity?

Andre Malinowski | Posted 20.10.2016 | UK Tech
Andre Malinowski

The trouble for me is that, with identity, there's no margin for error. A password can be easily changed, but a face, fingerprint or voice isn't so easy. This technology needs to be completely secure and tested before it is rolled out as a primary or sole method of identification for banking.

A Lesson About Password Re-Use: Don't

Paul McNeil | Posted 19.10.2016 | UK Tech
Paul McNeil

With more high-profile figures hacked these days, there is a growing concern about such measures against other famous figures, and even ordinary people, who fail to abide by a simple rule: don't re-use your passwords.

Social Engineering: Securing Workers In The Digital Age

Robert Arandjelovic | Posted 18.10.2016 | UK Tech
Robert Arandjelovic

Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.

Online Gaming: Balancing Speed And Security

David Emm | Posted 12.10.2016 | UK Tech
David Emm

With decision-making clearly faltering due to this growing 'obsession', now is the time to outline these threats and consider a safer way of online gaming. We would recommend the following to avoid opening yourself up to security attacks while in 'gaming mode'

TalkTalk Fined A Record £400,000 For 2015 Cyberattack

The Huffington Post | Oscar Williams | Posted 06.10.2016 | UK Tech

The Information Commissioner has issued internet service provider TalkTalk with a record £400,000 fine for failing to prevent an attack in 2015 which...

University Students In The UK Are Falling Victim To Phishing Attacks

Sufian Farrukh | Posted 05.10.2016 | UK Tech
Sufian Farrukh

According to a report released by National Fraud & Cyber Crime Reporting Centre, students in the UK's universities are being hit by a new wave of phishing emails that claim to offer a scholarship or an educational grant. The phishing email takes them to a fake website where they are deceived into revealing their personal information such as bank details.

Cybercriminals Are Launching Web Attacks Using Armies Of Hacked Devices

The Huffington Post | Oscar Williams | Posted 30.09.2016 | UK Tech

Cyber-criminals are building vast networks of hacked devices to launch web attacks of unprecedented force. Web hosting company OVH was recently knocke...

Why We're All Indirectly Contributing Towards Online Extortion

Andy Patel | Posted 30.09.2016 | UK Tech
Andy Patel

Last week, one of the most interesting cyber security stories of this year ended up being drowned out under the news of the Yahoo breach. The story in question was about a distributed denial of service (DDoS) attack against a site owned by Brian Krebs, a well-known security researcher.

The Death Taboo - What's Your Digital Legacy?

Tim Snaith | Posted 28.09.2016 | UK Tech
Tim Snaith

I say less developed and that is perhaps unfair. What is less developed are the policies those website companies adopt on death and the publicity surrounding the subject of how my data will be handled when the day comes.

A Hacker's Eye View: Targeted Attacks - Part One

Lawrence Munro | Posted 28.09.2016 | UK Tech
Lawrence Munro

The risk of a cyber-attack has become an unfortunate fact of life in today's digital world. However, while businesses of all sizes and in all sectors should certainly be aware they are under threat, just like all thieves, cyber criminals have their preferred targets and methods.

How Can You Protect What You Didn't Know Was Worth Stealing?

Gary Newe | Posted 26.09.2016 | UK Tech
Gary Newe

If we want to get better at fighting against hackers, the focus needs to be on what businesses need to protect and in assessing whether they have data or assets that are worth hacking. Our research found that 66% of people believe hackers are motivated by financial gain, with just 9% believing it was disruptive political or religious aims.

Why Are We So Bad With Our Passwords?

Alastair Paterson | Posted 26.09.2016 | UK Tech
Alastair Paterson

Criminals have known for years that people are the weakest link in any organizations' defenses, and that by cracking one person's account, they can effectively crack the multi-million dollar software and hardware investments.

Experts Warn Hackers Could Deliberately Crash Satellites In Future Attacks

The Huffington Post | Thomas Tamblyn | Posted 23.09.2016 | UK Tech

Experts have warned that in the future hackers will be turning their attention to the thousands of satellites in orbit, and the consequences could be ...

Is Your Webcam Or Baby Monitor Being Hacked? Find Out And Protect Yourself

The Huffington Post | Thomas Tamblyn | Posted 22.09.2016 | UK Tech

Imagine walking into your child’s bedroom and hearing a strange voice coming through your baby monitor. It’s a terrifying thought and yet accordin...

Don't Let Hackers Hold Your Business To Ransom

Jeremy Bergsman | Posted 20.09.2016 | UK Tech
Jeremy Bergsman

However, neither approach is a guaranteed fail-safe. A recent study showed that two-thirds of companies falling victim to an attack have surrendered and paid up. But paying the ransom only leaves companies vulnerable to future attacks and perpetuates the threat cycle.

Smart Device Hacking Gets Real

Alastair Paterson | Posted 19.09.2016 | UK Tech
Alastair Paterson

But news last week that car manufacturer Volkswagen has set up a special cybersecurity firm to protect smart connected vehicles from attack by hackers and other undesirables, would tend to suggest smart device security is getting "real" and is now part of business consciousness.

Is The Cloud Dying?

Nadav Israel | Posted 16.09.2016 | UK Tech
Nadav Israel

We need to rethink what it means to move something to the server, cloud or otherwise. We can embrace the cloud, but we need to deal very carefully with what we send to it. People need more control when it comes to their personal information, and we have to stop this obsession with moving data around for the sake of it.

The Director Of The FBI Thinks You Should Cover Up Your Webcam

The Huffington Post | Oscar Williams | Posted 15.09.2016 | UK Tech

The director of the FBI has urged people to cover up their webcams to prevent unauthorised snooping. Speaking at a conference in Washington, Director ...

Privacy Groups Say GCHQ's 'Great British Firewall' Could Threaten Civil Liberties

The Huffington Post | Oscar Williams | Posted 14.09.2016 | UK Tech

Privacy groups have spoken out against GCHQ’s plans for a “Great British Firewall” to protect major businesses and their customers from hackers....

Are You Cyber Security Savvy? Tips And Tricks To Consider When Going Back Into Education

Carmina Lees | Posted 14.09.2016 | UK Tech
Carmina Lees

In a world where everything is connected, 24/7 the key to keeping safe is constant vigilance and being aware of the places and circumstances where you could be most vulnerable. Here are a couple of examples of back to university scams.

Strong Structural Software Quality Is The Founding Pillar In The Digital Age

Vincent Delaroche | Posted 13.09.2016 | UK Tech
Vincent Delaroche

To make matters worse, modern technological advancements have resulted in more complex security threats. Innovative cyber-criminals are ready to pounce on faulty code, and businesses need to ensure they employ software applications that are fully secure and robust.

Brazzers Porn Site Hack Exposes Personal Details Of 800,000 Users

The Huffington Post | Oscar Williams | Posted 06.09.2016 | UK Tech

Hackers have exposed the email addresses, usernames and passwords of nearly 800,000 users of the porn site Brazzers. The data was stolen from an asso...