UK Cybersecurity

The Internet Of Ransomware

Javvad Malik | Posted 19.01.2017 | UK Tech
Javvad Malik

Whenever a new technology is adopted, there are teething problems. The user interfaces of smart devices are generally mobile apps that typically require users to go through painstaking processes of installation, account creation, pairing and configuration. Or worse still, the device might only communicate its status to users through a series of LEDs that make cracking the enigma code seem trivial by comparison.

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

Happy New Year! The Only Thing We Have To Fear Is The Lack Of Fear Itself

Dmitry Bagrov | Posted 12.01.2017 | UK Tech
Dmitry Bagrov

Every post you make, every breath you take, every search you make, they'll be watching you. Every bit of information you have ever entered anywhere online is stored, collated and held. For the most part, we give this data over without even thinking about the consequences, assuming it is safe.

2017 - The Year We All Need To Become Cyber Smart

Vince Warrington | Posted 12.01.2017 | UK Tech
Vince Warrington

Businesses - as well as the general public - will consequently have to get smarter and more agile if they don't want to fall victim to an increasingly sophisticated and well-coordinated network of cyber gangs.

Time For Your New Year Cyber Detox?

Alastair Paterson | Posted 10.01.2017 | UK Tech
Alastair Paterson

If I had been writing this blog even three years ago, it is probable I would have talked about needing to recognise the cyber risk and not bury our heads in the sand to the industrialised threat caused by professional cybercrime.

Seven Tips To Shop Safe This Holiday Season

Sheheryar Ahmed Khan | Posted 30.12.2016 | UK Tech
Sheheryar Ahmed Khan

Traffic in malls and stores is usually at its peak during these days. It's almost impossible to find relevant staff to fulfill your queries since they are usually busy handling a bunch of other potential customers. You also encounter inventory issues during this season, with much of the popular stuff already being sold out.

'Tis The Season To Be Sorry

Mike Foreman | Posted 23.12.2016 | UK Tech
Mike Foreman

For example too many employees, temporary or otherwise, think nothing of exchanging sensitive database information with colleagues via mobile messaging accounts, uploading the data to personal devices, sharing passwords and so on.

It's The Most Vulnerable Time Of The Year

Gad Elkin | Posted 23.12.2016 | UK Tech
Gad Elkin

Our report shows the number of these telnet and SSH scans has increased by 140% year-on-year from July 2015, with the figure increasing significantly from May 2016 onwards, double the previous peak level from the 12-month period.

A Connected World: It's Time We Put A Stop To Cybercrime

Adrian Adair | Posted 22.12.2016 | UK Tech
Adrian Adair

Over the past decade, our habits as consumers have radically evolved, from online banking and shopping to how we communicate with our family members - remember fax machines for communication in the workplace and the introduction of the first mobile phone?

Keeping Christmas Merry - Broaching Online Safety This Festive Season

Estelle Lloyd | Posted 22.12.2016 | UK Parents
Estelle Lloyd

Christmas is nearly upon us, and no doubt many little ones will be waking up to the joy of new tablets and devices under the tree this year. But with extra screen time comes new parenting challenges - how can we ensure that our kids aren't stumbling across inappropriate content while eagerly testing out their new toys?

Christmas Fraud: Thousands Risk Losing Everything Under The Tree In Online Shopping Threat

Nicholas Shaw | Posted 21.12.2016 | UK Tech
Nicholas Shaw

At Christmas, the sheer volume of transactions and abnormal spending patterns can be hard to keep track of. Large online shopping events can motivate cybercriminals to target bargain hunters in greater numbers.

Zeroes And (Young)Ones: The Future Of Technology In The Classroom

Claire Stead | Posted 21.12.2016 | UK Tech
Claire Stead

The days of chalkboards and dusty textbooks in classrooms are long gone. Over the past two decades, technology has slowly crept into the classroom, changing the way students study and access information, and also opened up a whole new world of resources for teachers to utilise.

Why Phishing Is Only The Beginning Of A Cyber Attack

John Worrall | Posted 19.12.2016 | UK Tech
John Worrall

Of course it is always better to keep an attacker outside of your network if you can. But, recognising the difficulty of that, many companies today operate as if a breach has already (or will) occurred.

The Rise Of Facebank - Why Social Banking Is Here To Stay

Michiel Lely | Posted 21.12.2016 | UK Tech
Michiel Lely

Social banking will allow users to access online banking services using their social media account credentials via the bank's normal homepage and log in portal. They would then check their balance, make transactions and view any other information as normal.

12 Shares Of Christmas - Tips To Make Sure Your Children Are Sharing Online Safely

Carolyn Bunting, Internet Matters | Posted 16.12.2016 | UK Parents
Carolyn Bunting, Internet Matters

We've calculated that in the time it takes to cook the average Christmas turkey, 1.3 billion photos will be posted online. While you're sitting back watching the Queen's Christmas message, over 5 million images will be sent to Snapchat, alone.

Putting Industrial Control System Operators In The Security Driving Seat

William Culbert | Posted 15.12.2016 | UK Tech
William Culbert

However, as industrial controls manage power, transport, water, gas and other critical infrastructure, the potential disruption and resulting downtime from any issue to these systems can have a significant impact to national infrastructure.

The Everyday Dangers Of The Internet

Daniel Woods | Posted 14.12.2016 | UK Universities & Education
Daniel Woods

The Dark Web, the Deep Web, the Dark Internet. Take a much used and little understood technology, add a threatening adjective and you get hype and fearmongering. Are there real threats to your privacy? Yes. Is there something you can do about it? Absolutely.

MELT Away Scams This Winter

Javvad Malik | Posted 09.12.2016 | UK Tech
Javvad Malik

Scams can vary greatly in their nature and execution methods, but the majority of them work by emotionally manipulating their victims' behaviour through greed, desire or fear. For this reason, keeping in mind a simple acronym, MELT - which stands for Money, Employment, Love and Threats -

2017 The Year Of.....

Alastair Paterson | Posted 09.12.2016 | UK Tech
Alastair Paterson

In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.

Artificial Intelligence: An Answer To The IoT Cyber Security Pitfall?

Bryan Lillie | Posted 08.12.2016 | UK Tech
Bryan Lillie

The combined factors of intense growth and little regard for security has created an interconnected network with numerous vulnerabilities that stretches across the globe and is allowing compromised IoT devices to frequently become staging posts for more serious hacks in networks.

Security Myths That Can Make Brits Laugh... Or Cry

Sufian Farrukh | Posted 07.12.2016 | UK Tech
Sufian Farrukh

Since different people have different orientation based on their cultures, regions and environment, there could be hundreds of cyber security myths which might not be covered by security experts or bloggers. Therefore, a culture of research needs to be prevailed.

'Millions' Of Dailymotion Account Details Stolen In Hack

The Huffington Post | Oscar Williams | Posted 08.12.2016 | UK Tech

The usernames and emails of more than 85 million users of the video sharing site Dailymotion have been stolen in a data breach, Leakedsource reported....

Bletchley Park Will Soon Be Home To The Next Generation Of Britain's Codebreakers

The Huffington Post | Oscar Williams | Posted 26.11.2016 | UK Tech

Bletchley Park, once home to the team that cracked Enigma, is set to reopen its doors as a sixth form college for the next generation of code-breakers...

Careful Surfing Required In The Digital Age

Alastair Paterson | Posted 23.11.2016 | UK Tech
Alastair Paterson

The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.

Tech-Savvy Young People Needed To Plug Widening Skills Gap

David Emm | Posted 23.11.2016 | UK Tech
David Emm

Whether as masterminds of these attacks or foot soldiers in the pay of criminal gangs, teenager hackers have been linked with many high profile cybercrimes in recent years. In fact, the frequency of teenage cyber-attacks is growing as each generation's competency grows