28 NHS Trusts And 23 Universities Hit By Ransomware Attacks In Last Year, Surveys Find

The Huffington Post | Oscar Williams | Posted 24.08.2016 | UK Tech

Cybercriminals are increasingly targeting British hospitals and universities with ransomware attacks, two new studies have found. NCC Group revealed ...

People Ignore Software Safety Warnings 90 Per Cent Of The Time, Which Is Really Bad

The Huffington Post | Thomas Tamblyn | Posted 18.08.2016 | UK Tech

You’re in the middle of doing something on your computer and suddenly a pop-up appears, warning you about some security issue. What do you do? Well ...

Want to Build a Pokémon GO Empire? Here's What You Need to Know

Gary Newe | Posted 01.08.2016 | UK Tech
Gary Newe

But as we have seen over the last few weeks, a surge in popularity can leave a company more likely to be exposed to vulnerabilities. Here, we take a look at some of the challenges faced by Niantic Labs and Nintendo and what we can learn from them

Hackers Can Actually See What You're Typing On Some Wireless Keyboards

The Huffington Post | Thomas Tamblyn | Posted 27.07.2016 | UK Tech

The words being typed on a wireless keyboard can be easily seen and stolen by hackers, a cybersecurity firm has warned. The worrying revelation was ma...

The Data Game

Nicholas Shaw | Posted 11.07.2016 | UK Sport
Nicholas Shaw

Like most kids, I spent many a day dream winning trophies and representing my country on various sporting battlefields. Like most adults, I spend many an hour shouting at or cheering on the men and women who actually made those dreams a reality.

This New Anti-Ransomware Tool Could Save You Hundreds Of Pounds

The Huffington Post | Oscar Williams | Posted 11.07.2016 | UK Tech

Ransomware is the world’s fastest growing form of malware. The malicious software works by encrypting a victim’s files and requesting a ransom fee...

The Data Game

Nicholas Shaw | Posted 08.07.2016 | UK Tech
Nicholas Shaw

Like most kids, I spent many a day dream winning trophies and representing my country on various sporting battlefields. Like most adults, I spend many an hour shouting at or cheering on the men and women who actually made those dreams a reality.

Putting Your Birthday On Facebook Increases Your Risk Of Identity Fraud

The Huffington Post | Oscar Williams | Posted 07.07.2016 | UK Tech

Prolific sharers on social media might be putting themselves at increased risk of identity fraud, according to security experts. A new report from Ci...

Lies, Scams and Picture Leaks - The Risks of Online Dating

Nicholas Shaw | Posted 21.06.2016 | UK Lifestyle
Nicholas Shaw

Rewind a decade and looking for love online was the dating equivalent of a rocker listening to Justin Bieber. Fast forward a few years, and the stigma around online dating has all but faded. In fact, for time-pressured millennials, online dating has all but become a norm, with people spending an average of 17 days a year looking for love online.

Knowing Me, Knowing You - GCHQ's First Month on Twitter

Andre van Loon | Posted 14.06.2016 | UK Tech
Andre van Loon

For decades, few people knew how the British Intelligence services worked. How did one even become a spy? Did it really involve a tap on the shoulder and a discreet conversation about Northern Ireland or the Soviet Union?

How to Strike a Balance With Parental Controls

David Emm | Posted 13.06.2016 | UK Tech
David Emm

Parents are constantly looking for ways to keep their family safe. Nowadays, it's just as important to protect their virtual lives as it is their real lives.

Is the Writing Finally on the Wall for Email?

Mike Foreman | Posted 26.05.2016 | UK Tech
Mike Foreman

There is no doubt that mobile messaging is extremely efficient. Individuals can gain immediate access to colleagues, customers and contacts outside the company to help them arrive at decisions faster and achieve better outcomes.

The Race to Autonomous Vehicles: How Cyber-Security Is Putting the Connected Car in Reverse

Gary Newe | Posted 21.03.2016 | UK Tech
Gary Newe

It's official - the automotive industry is being disrupted by new business models and technologies. The frontiers have undoubtedly been shifted, as manufacturers compete to produce driverless and connected cars.

Security on the Go: Smartphones Increasingly at Risk

David Emm | Posted 16.03.2016 | UK Tech
David Emm

Mobile devices have become an extension of our everyday lives. Whether we're checking the news, browsing an online shop or catching up with loved ones on social networks - there's no denying that our handheld devices make our lives much more convenient...

The US Is About To Unleash Its Full Cyber-Might Against ISIS

The Huffington Post UK | Thomas Tamblyn | Posted 02.03.2016 | UK Tech

The US Military has officially confirmed that it has begun systematic cyber attacks against the so-called/self-proclaimed Islamic State (ISIS) in Mosu...

Fighting Crime Online: How Law Enforcement Agencies Are Working to Keep Citizens Safe

Russell Haworth | Posted 24.02.2016 | UK Tech
Russell Haworth

Tackling the broader cybercrime challenge needs an orchestrated response. I wanted to highlight three ways in which law enforcement agencies are working with each other and other organisations (including my own) to tackle the real and very present danger represented by opportunistic and organised criminals online...

Online Security: Quit Asking the Kids

Nicholas Shaw | Posted 31.01.2016 | UK Tech
Nicholas Shaw

We've all been there. Either sheepishly asking our kids, 'how do you do that thing that makes it stop beeping', or on the other side sighing as you pick up your father's phone and see 36 notifications in the task bar. But those days could be numbered.

The Government Wants To Give You Police-Style Powers To Fight Cyber Crime

The Huffington Post UK | Nitya Rajan | Posted 21.01.2016 | UK Tech

Volunteers are set to receive "police-style" powers in a bid to boost the fight against cyber crime, the Government has announced. Under the new m...

Top 10 Technology Predictions for 2016

Anthony Sherick | Posted 07.01.2016 | UK Tech
Anthony Sherick

Last year was a ground-breaking year for technological innovation with several advancements in medicine, the automotive industry and mobile/handheld technology. So, how will 2016 follow up with advancements in technology?

Toy Hacks: Another Example of Why Security Needs an Overhaul

Graham Welch | Posted 10.12.2015 | UK Tech
Graham Welch

From baby monitors that allow parents to watch their infants remotely, to smart talking dolls, which connect to a database to answer kids' questions, the same connectivity seen in adult gadgets is now reaching our children. But what happens when hackers gain access to that data?

Boards Must Act on Cyber Security - or Heads Will Roll

Dr. Mike Lynch | Posted 25.11.2015 | UK Tech
Dr. Mike Lynch

If you are currently sitting in your office reviewing risk for 2016 and thinking that the biggest cyber threat is a 15-year-old leaking customer credi...

Cyberbullying: A Parent's Guide to Prevention

Vicki Marinker | Posted 19.11.2015 | UK Tech
Vicki Marinker

This week is Anti-Bullying Week so I've been hunting around on the internet (safely obvs) to find the best advice about how to prevent, and deal with bullying - particularly cyberbullying.

Why Business Must Understand the Threat of the Internet of Things

Nigel Somerville MBE | Posted 18.11.2015 | UK Tech
Nigel Somerville MBE

The potential of the Internet of Things (IoT) is jaw dropping. Its value to industry could be worth $11.1trillion a year globally and it will revoluti...

Surveillance Bill: A Cyber Security Expert's View

George Dokimakis | Posted 06.11.2015 | UK Tech
George Dokimakis

If the government really wanted to make a difference, it would properly penalise companies that underinvest in security and lose people's information with little to no impact. It would not ask them to increase the data they are holding about individuals. Holding more data about individuals will make subsequent data losses catastrophic to their everyday lives.

McFly and Doc Never Saw Cybercrime Coming

Graham Welch | Posted 21.10.2015 | UK Tech
Graham Welch

If we want to keep on the path of creating technology seen in sci-fi films, and not horror ones, we all need to bring our concepts of cybersecurity to the 21st century.