UK Cybersecurity

How Well Do You Want The Government To Know You?

Salvatore Sinno | Posted 23.02.2017 | UK Tech
Salvatore Sinno

It is easy to see the benefits of biometrics as a supplement, and perhaps even a replacement, to traditional identification measures. Biometric factors of identity cannot be lost or forgotten, they are things that everyone carries around with them at all times

How To Protect Your Wifi Network From Hackers, According To Experts

The Huffington Post | Oscar Williams | Posted 21.02.2017 | UK Tech

More than half of Brits don’t know how to set up a secure home wifi network, according to a damning survey of consumers’ cybersecurity habits. And...

Top Ten Investment Tech Trends Revealed at 2017 OurCrowd Global Investment Summit

Jon Medved | Posted 20.02.2017 | UK Tech
Jon Medved

OurCrowd, the leading global equity crowdfunding platform, made history today and hosted the biggest investment event in Israel, the Startup Nation. With 6,000 guests from 82 countries attending, including startups, venture capitalists and strategic investors, the event was packed

2017: The Year To Resist Ransomware

David Emm | Posted 20.02.2017 | UK Tech
David Emm

Unfortunately, this is testimony to the success attackers have achieved with this type of malware and demonstrates the growing impact that that cybercrime can have on our everyday lives. The truth is that it can - and it might happen to you.

Catch 'Em While They Are Young

Alastair Paterson | Posted 15.02.2017 | UK Tech
Alastair Paterson

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.

Britain Was Hit By Hundreds Of High-Level Cyber Attacks In The Last Three Months

The Huffington Post | Thomas Tamblyn | Posted 13.02.2017 | UK Tech

Britain’s national security was threatened 188 times by cyber attacks in just the last three months. The revelation comes from an exclusive intervie...

You Should Turn On This New WhatsApp Setting Now

The Huffington Post | Oscar Williams | Posted 10.02.2017 | UK Tech

WhatsApp has finally rolled out two-step verification to all its users after a limited trial began last year. The new feature stops someone from activ...

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

Are The Lines Between 'Sim' And 'Human' Blurring?

Nick Brown | Posted 30.01.2017 | UK Tech
Nick Brown

Up to now, the distinction between digital simulations and the humans creating them has been relatively clear. However, as more and more of our 'human' lives are digitised, could this line be starting to blur?

The Technological Revolution Shows No Signs Of Slowing Down In 2017, But Challenges Remain

Graham Hunter | Posted 26.01.2017 | UK Tech
Graham Hunter

We are living in an era where our working environment is drastically changing. Technology has become one of the key components of organisations across all types of businesses, whether it's a multinational corporation or an SME, and our reliance will only increase. We are in the midst of another industrial revolution that shows no sign of slowing down and IT firms are reaping the benefits of this.

Humans Don't Even Account For Half Of The Internet's Traffic

The Huffington Post | Thomas Tamblyn | Posted 24.01.2017 | UK Tech

Considering the internet was made by humans for humans you would, quite sensibly assume that the vast majority of all traffic on the internet does the...

The Internet Of Ransomware

Javvad Malik | Posted 19.01.2017 | UK Tech
Javvad Malik

Whenever a new technology is adopted, there are teething problems. The user interfaces of smart devices are generally mobile apps that typically require users to go through painstaking processes of installation, account creation, pairing and configuration. Or worse still, the device might only communicate its status to users through a series of LEDs that make cracking the enigma code seem trivial by comparison.

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

Happy New Year! The Only Thing We Have To Fear Is The Lack Of Fear Itself

Dmitry Bagrov | Posted 12.01.2017 | UK Tech
Dmitry Bagrov

Every post you make, every breath you take, every search you make, they'll be watching you. Every bit of information you have ever entered anywhere online is stored, collated and held. For the most part, we give this data over without even thinking about the consequences, assuming it is safe.

2017 - The Year We All Need To Become Cyber Smart

Vince Warrington | Posted 12.01.2017 | UK Tech
Vince Warrington

Businesses - as well as the general public - will consequently have to get smarter and more agile if they don't want to fall victim to an increasingly sophisticated and well-coordinated network of cyber gangs.

Time For Your New Year Cyber Detox?

Alastair Paterson | Posted 10.01.2017 | UK Tech
Alastair Paterson

If I had been writing this blog even three years ago, it is probable I would have talked about needing to recognise the cyber risk and not bury our heads in the sand to the industrialised threat caused by professional cybercrime.

Seven Tips To Shop Safe This Holiday Season

Sheheryar Ahmed Khan | Posted 30.12.2016 | UK Tech
Sheheryar Ahmed Khan

Traffic in malls and stores is usually at its peak during these days. It's almost impossible to find relevant staff to fulfill your queries since they are usually busy handling a bunch of other potential customers. You also encounter inventory issues during this season, with much of the popular stuff already being sold out.

'Tis The Season To Be Sorry

Mike Foreman | Posted 23.12.2016 | UK Tech
Mike Foreman

For example too many employees, temporary or otherwise, think nothing of exchanging sensitive database information with colleagues via mobile messaging accounts, uploading the data to personal devices, sharing passwords and so on.

It's The Most Vulnerable Time Of The Year

Gad Elkin | Posted 23.12.2016 | UK Tech
Gad Elkin

Our report shows the number of these telnet and SSH scans has increased by 140% year-on-year from July 2015, with the figure increasing significantly from May 2016 onwards, double the previous peak level from the 12-month period.

A Connected World: It's Time We Put A Stop To Cybercrime

Adrian Adair | Posted 22.12.2016 | UK Tech
Adrian Adair

Over the past decade, our habits as consumers have radically evolved, from online banking and shopping to how we communicate with our family members - remember fax machines for communication in the workplace and the introduction of the first mobile phone?

Keeping Christmas Merry - Broaching Online Safety This Festive Season

Estelle Lloyd | Posted 22.12.2016 | UK Parents
Estelle Lloyd

Christmas is nearly upon us, and no doubt many little ones will be waking up to the joy of new tablets and devices under the tree this year. But with extra screen time comes new parenting challenges - how can we ensure that our kids aren't stumbling across inappropriate content while eagerly testing out their new toys?

Christmas Fraud: Thousands Risk Losing Everything Under The Tree In Online Shopping Threat

Nicholas Shaw | Posted 21.12.2016 | UK Tech
Nicholas Shaw

At Christmas, the sheer volume of transactions and abnormal spending patterns can be hard to keep track of. Large online shopping events can motivate cybercriminals to target bargain hunters in greater numbers.

Zeroes And (Young)Ones: The Future Of Technology In The Classroom

Claire Stead | Posted 21.12.2016 | UK Tech
Claire Stead

The days of chalkboards and dusty textbooks in classrooms are long gone. Over the past two decades, technology has slowly crept into the classroom, changing the way students study and access information, and also opened up a whole new world of resources for teachers to utilise.

Why Phishing Is Only The Beginning Of A Cyber Attack

John Worrall | Posted 19.12.2016 | UK Tech
John Worrall

Of course it is always better to keep an attacker outside of your network if you can. But, recognising the difficulty of that, many companies today operate as if a breach has already (or will) occurred.

The Rise Of Facebank - Why Social Banking Is Here To Stay

Michiel Lely | Posted 21.12.2016 | UK Tech
Michiel Lely

Social banking will allow users to access online banking services using their social media account credentials via the bank's normal homepage and log in portal. They would then check their balance, make transactions and view any other information as normal.