UK Cybersecurity

MELT Away Scams This Winter

Javvad Malik | Posted 09.12.2016 | UK Tech
Javvad Malik

Scams can vary greatly in their nature and execution methods, but the majority of them work by emotionally manipulating their victims' behaviour through greed, desire or fear. For this reason, keeping in mind a simple acronym, MELT - which stands for Money, Employment, Love and Threats -

2017 The Year Of.....

Alastair Paterson | Posted 09.12.2016 | UK Tech
Alastair Paterson

In many ways, 2016 was very much the 'Year of the Ransomware Threat', and it is very hard to see that changing much next year. After all most cybercrime is driven by hard cash and the fact remains that most ransomware and extortion attacks are successful.

Artificial Intelligence: An Answer To The IoT Cyber Security Pitfall?

Bryan Lillie | Posted 08.12.2016 | UK Tech
Bryan Lillie

The combined factors of intense growth and little regard for security has created an interconnected network with numerous vulnerabilities that stretches across the globe and is allowing compromised IoT devices to frequently become staging posts for more serious hacks in networks.

Security Myths That Can Make Brits Laugh... Or Cry

Sufian Farrukh | Posted 07.12.2016 | UK Tech
Sufian Farrukh

Since different people have different orientation based on their cultures, regions and environment, there could be hundreds of cyber security myths which might not be covered by security experts or bloggers. Therefore, a culture of research needs to be prevailed.

'Millions' Of Dailymotion Account Details Stolen In Hack

The Huffington Post | Oscar Williams | Posted 08.12.2016 | UK Tech

The usernames and emails of more than 85 million users of the video sharing site Dailymotion have been stolen in a data breach, Leakedsource reported....

Bletchley Park Will Soon Be Home To The Next Generation Of Britain's Codebreakers

The Huffington Post | Oscar Williams | Posted 26.11.2016 | UK Tech

Bletchley Park, once home to the team that cracked Enigma, is set to reopen its doors as a sixth form college for the next generation of code-breakers...

Careful Surfing Required In The Digital Age

Alastair Paterson | Posted 23.11.2016 | UK Tech
Alastair Paterson

The truth is that exposed credentials from adult dating sites hold particular value for cyber criminals given their potential to extort victims. Most subscribers to these services want to remain anonymous and don't want their employers or families to know. Users are likely to be prepared to pay large amounts of money to prevent their details being exposed online where others can see them.

Tech-Savvy Young People Needed To Plug Widening Skills Gap

David Emm | Posted 23.11.2016 | UK Tech
David Emm

Whether as masterminds of these attacks or foot soldiers in the pay of criminal gangs, teenager hackers have been linked with many high profile cybercrimes in recent years. In fact, the frequency of teenage cyber-attacks is growing as each generation's competency grows

Creating An Effective Cyber Security Response Plan

John Worrall | Posted 23.11.2016 | UK Tech
John Worrall

Organisations plan for success. They should also plan for worst case scenarios - especially in the case of a cyber attack or breach. For many organisations, preparedness means developing plans for disaster recovery and continuity of operations.

The Three Mobile Attack Proves We Need To Train Everyone To Be A Barrier To Breaches

Graham Hunter | Posted 23.11.2016 | UK Tech
Graham Hunter

If businesses want to prevent attacks like this happening, they need to ensure that everyone has basic cyber hygiene: that they know the basics to prevent a breach, how to spot potential attacks and understand the implications of their actions on the wider company, and even economy.

How Artificial Intelligence And Analytics Deal With Insider Threats

Ben Dickson | Posted 18.11.2016 | UK Tech
Ben Dickson

These are insider threats, the number one contributing factor to security incidents within enterprises. Despite what you see in hacker movies such as Blackhat, the biggest threat to organisations' networks are the people who are working for them.

Defence Against Cyber Threats Close To Home And Out Of This World

Geoff Smith | Posted 16.11.2016 | UK Tech
Geoff Smith

As the threat of cybercrime intensifies both on and around the planet, there's never been a more important time for organisations to batten down the hatches to protect themselves. By adopting these types of approaches however, businesses will be able to strengthen their defence and ensure they don't become the next cyber-attack headline.

How To Fix The Internet Of Things Security Mess

Ben Dickson | Posted 14.11.2016 | UK Tech
Ben Dickson

There's presently a lot of frustration surrounding who is to blame for the mess and general concern over whether the IoT industry is a failure threatening to destabilise the entire internet infrastructure.

Three Topics In Industrial IoT That Everyone's Talking About

Roger Bou | Posted 14.11.2016 | UK Tech
Roger Bou

Industrial IoT (IIoT) is projected to be worth $151bn by 2020, so it's a pretty big deal. As a relatively young industry, the topics being hotly debated now in IIoT are set to shape its entire future.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.

The Head Of The NSA Is Testing Boeing's Self-Destructing Smartphone

The Huffington Post | Oscar Williams | Posted 10.11.2016 | UK Tech

Elite members of the US military, including the head of the NSA, have started testing a super secure Boeing smartphone which can self-destruct. The B...

The New World Of Artificially Intelligent Security

Reuven Cohen | Posted 08.11.2016 | UK Tech
Reuven Cohen

An AI arms race is only beginning to emerge as these forms of advanced systems become more self-sufficient. As this transition takes hold, so will the systems set up to combat them. A war will rage, one that may have little to no actual human involvement.

UK Government Gets Serious About Cybercrime

Alastair Paterson | Posted 07.11.2016 | UK Tech
Alastair Paterson

Clearly cyber attackers have their sights firmly set on everything we do online these days and that requires us, as citizens, business people and government representatives to take a different view of cybersecurity.

Only Celebrities Should Worry About Online Security And Privacy, Right?

Sufian Farrukh | Posted 04.11.2016 | UK Tech
Sufian Farrukh

Yes, common internet users like me and you have a very limited social circle and we value that over anything else. Having said that, would you still take the risk of not ensuring your privacy and anonymity online?

Thieves Could Use Special Glasses To Trick Facial Recognition Security Software

The Huffington Post | Oscar Williams | Posted 02.11.2016 | UK Tech

Q: What do Windows 10 and Alibaba have in common? A: Both allow you to log in using facial recognition software. The increasingly popular tech may se...

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

The Waugh Zone November 1, 2016

The Huffington Post | Paul Waugh | Posted 01.11.2016 | UK Politics

The five things you need to know on Tuesday, November 1… 1) CYBERMAN STRIKES BACK The word ‘cyber’, like the word ‘digital’, is ofte...

The UK's 2016-2021 Cyber Security Strategy: What Might Be In Store For Britain's Cyberspace

Bryan Lillie | Posted 31.10.2016 | UK Tech
Bryan Lillie

Raising awareness of how big a part cyber security plays in our lives is key. Since the development of the internet online threats have moved out of the IT industry and into culture, consumer technology and popular consciousness.

What Botnets And DDoS Attacks Teach Us About IoT Security

Ben Dickson | Posted 27.10.2016 | UK Tech
Ben Dickson

There's a lot to be learned from last Friday's spate of cyberattacks, which denied millions of users access to major websites such as Twitter, PayPal, Netflix and Spotify. The attack was targeted mainly in the U.S. east coast, with other geographical areas being affected to a lesser degree.

The Internet Of Things And DDoS - The Joke Is On Us

Vince Warrington | Posted 27.10.2016 | UK Tech
Vince Warrington

The size of attacks has increased exponentially, thanks to the cyber criminals making use of the IoT. These devices are typically designed to be quick and cheap to produce, and have very poor levels of security. Essentially stripped-down versions of your home computer