UK Cybersecurity

Decoding The Minds Of Hackers

Chris Pogue | Posted 20.03.2017 | UK Tech
Chris Pogue

Decoding the minds of hackers means we're developing the best solution to real life circumstances.

Why We Need To Make Smart Home Technology More Secure

Philip Woods | Posted 17.03.2017 | UK Tech
Philip Woods

The government has already laid out specific security standards which need to be met as part of their plans to roll out smart meters in all homes by 2020. According to British Gas, their smart meters are protected by security techniques that are more complex than the ones used in online banking.

The Evolution Of Cyberspace

Bryan Lillie | Posted 17.03.2017 | UK Tech
Bryan Lillie

When one compares cyber security today to what it was ten years ago, the two are almost unidentifiable as the same industry. The iPhone had only just launched; Facebook was still in it's infancy; the Internet of Things (IoT) was still a dream.

Just How Safe Are Our Mobile Apps?

Alastair Paterson | Posted 16.03.2017 | UK Tech
Alastair Paterson

We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email

How To Ensure The Internet Is Your Family's Friend... Not An Enemy

David Emm | Posted 15.03.2017 | UK Tech
David Emm

With online threats varying from personal data collected on devices to grooming on gaming platforms and trolling in social media forums, one in five children (21%) admit they worry that a stranger may bully them and 18% worry that a stranger might ask them to do something illegal.

Hacking; The Threat That Isn't Going Away

Thomas Fischer | Posted 15.03.2017 | UK Tech
Thomas Fischer

We'll be OK, right? Wrong. Like it or not, the threat is all around us. And growing. It's no longer the isolated, odd geek in his bedroom who lives on a diet of pizza and computer code. Today, it's about power and money with both things driving an explosion in the number of active hackers.

The Secret Life Of Connected Homes

Nicholas Shaw | Posted 10.03.2017 | UK Tech
Nicholas Shaw

Beauty and The Beast set me up with some unrealistic expectations of my household furnishings. Whilst the Internet of Things (IoT) may not yet have given candelabras a quippy sentience, it has given standard home fixtures a secret life. However, this isn't quite the heart-warming picture Disney painted for us.

Traditional Security Is Dead - How Adaptive Security Is The Immune System Of The Modern Enterprise

Salvatore Sinno | Posted 10.03.2017 | UK Tech
Salvatore Sinno

New challenges include the emergence of the Internet of Things (IoT) and the Internet of Everything (IoE), the transition from IPv4 to IPv6 (Internet Protocol version 6) and the sudden proliferation of readily addressable end points

Everyone Should Be A Hacker - And This Is Why

Jacob Lindsay | Posted 06.03.2017 | UK Tech
Jacob Lindsay

Perhaps the question for everyone today is not 'why hack?' but rather what's your hack? In a time of extreme instability and change, perhaps the smartest place to be is one that welcomes interruption and self-review

Real CEO, Fake CEO: Who Is The Biggest Enterprise Threat?

Mike Foreman | Posted 06.03.2017 | UK Tech
Mike Foreman

With so much at stake and so much already invested in security systems to then allow cybercriminals a way into the organization that's completely beyond the IT department's control is the business equivalent of shooting yourself in the foot.

Two Million Parents' And Children's Messages 'Leaked In CloudPets Breach'

The Huffington Post | Oscar Williams | Posted 03.03.2017 | UK Tech

Two million voice messages recorded by parents and their children via a “smart” cuddly toy have been leaked online, according to a cybersecurity r...

Unsafe Selfies And Check-In Troubles: Four Tips To Stay Safe Online

Claire Stead | Posted 28.02.2017 | UK Tech
Claire Stead

Facebook now sees eight billion average daily video views and Snapchat users aren't far behind, sending more than seven billion photos and videos each day. They say sharing is caring - and that's true to an extent. But when you overshare or share the wrong information online, that can often lead to tricky conversations or unintended consequences.

How Well Do You Want The Government To Know You?

Salvatore Sinno | Posted 23.02.2017 | UK Tech
Salvatore Sinno

It is easy to see the benefits of biometrics as a supplement, and perhaps even a replacement, to traditional identification measures. Biometric factors of identity cannot be lost or forgotten, they are things that everyone carries around with them at all times

How To Protect Your Wifi Network From Hackers, According To Experts

The Huffington Post | Oscar Williams | Posted 21.02.2017 | UK Tech

More than half of Brits don’t know how to set up a secure home wifi network, according to a damning survey of consumers’ cybersecurity habits. And...

Top Ten Investment Tech Trends Revealed at 2017 OurCrowd Global Investment Summit

Jon Medved | Posted 20.02.2017 | UK Tech
Jon Medved

OurCrowd, the leading global equity crowdfunding platform, made history today and hosted the biggest investment event in Israel, the Startup Nation. With 6,000 guests from 82 countries attending, including startups, venture capitalists and strategic investors, the event was packed

2017: The Year To Resist Ransomware

David Emm | Posted 20.02.2017 | UK Tech
David Emm

Unfortunately, this is testimony to the success attackers have achieved with this type of malware and demonstrates the growing impact that that cybercrime can have on our everyday lives. The truth is that it can - and it might happen to you.

Catch 'Em While They Are Young

Alastair Paterson | Posted 15.02.2017 | UK Tech
Alastair Paterson

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.

Britain Was Hit By Hundreds Of High-Level Cyber Attacks In The Last Three Months

The Huffington Post | Thomas Tamblyn | Posted 13.02.2017 | UK Tech

Britain’s national security was threatened 188 times by cyber attacks in just the last three months. The revelation comes from an exclusive intervie...

You Should Turn On This New WhatsApp Setting Now

The Huffington Post | Oscar Williams | Posted 10.02.2017 | UK Tech

WhatsApp has finally rolled out two-step verification to all its users after a limited trial began last year. The new feature stops someone from activ...

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

Are The Lines Between 'Sim' And 'Human' Blurring?

Nick Brown | Posted 30.01.2017 | UK Tech
Nick Brown

Up to now, the distinction between digital simulations and the humans creating them has been relatively clear. However, as more and more of our 'human' lives are digitised, could this line be starting to blur?

The Technological Revolution Shows No Signs Of Slowing Down In 2017, But Challenges Remain

Graham Hunter | Posted 26.01.2017 | UK Tech
Graham Hunter

We are living in an era where our working environment is drastically changing. Technology has become one of the key components of organisations across all types of businesses, whether it's a multinational corporation or an SME, and our reliance will only increase. We are in the midst of another industrial revolution that shows no sign of slowing down and IT firms are reaping the benefits of this.

Humans Don't Even Account For Half Of The Internet's Traffic

The Huffington Post | Thomas Tamblyn | Posted 24.01.2017 | UK Tech

Considering the internet was made by humans for humans you would, quite sensibly assume that the vast majority of all traffic on the internet does the...

The Internet Of Ransomware

Javvad Malik | Posted 19.01.2017 | UK Tech
Javvad Malik

Whenever a new technology is adopted, there are teething problems. The user interfaces of smart devices are generally mobile apps that typically require users to go through painstaking processes of installation, account creation, pairing and configuration. Or worse still, the device might only communicate its status to users through a series of LEDs that make cracking the enigma code seem trivial by comparison.

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.