When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

Crisis Management: How To Handle A Cyber Security Incident

Paul Rose | Posted 16.01.2017 | UK Tech
Paul Rose

By having a Crisis Management Plan in place, organisations are better prepared to identify potential attack scenarios, enabling you to better handle a security incident irrespective of type and scale.

10 Most Damaging Hacks Of All Time

AllTime10s | Posted 27.01.2015 | UK Tech

The recent attacks on Sony Pictures have brought the issue of cyber warfare to forefront of international relations. Let's have a look at some of the ...

Dropbox Hacked?

The Huffington Post UK | Thomas Tamblyn | Posted 14.10.2014 | UK Tech

Dropbox has not been hacked according to an official blog post published early this morning. In a post that first appeared on the 13 October but wa...

How to Handle a Nigerian E-mail Scammer

Stephen Hamilton | Posted 03.11.2014 | UK Comedy
Stephen Hamilton

We've all had them, we've all read them, and some have actually been stupid enough to reply to them. I am of course talking about the famous, "Dear sir, I am the son of an African diplomat...blah, blah, blah, E-mail.

The Lazy Attacker: Not So Different From Your Average Criminal

Jaime Blasco | Posted 17.09.2013 | UK Tech
Jaime Blasco

Most cyber attackers are likely to use the easiest route in. They're lazy. No different from your run-of-the-mill hijacker who will gladly steal the car of someone who leaves the keys in it. In the case of the cyber criminal, he will of course test the 'lowest common denominator' method against the widest range of IP addresses from the same source set of IP addresses.

Why Hire a Hacker?

Dominique Karg | Posted 18.05.2013 | UK Tech
Dominique Karg

It's only natural to use the tool that's been perfectly designed for the job yet, for some reason, when it comes to securing the corporate infrastructure, many are frightened by the idea of hiring a hacker. I believe they're missing out.

Zombie Apocalypse Hoax Broadcast On US Emergency Alert System

Huffington Post UK | Posted 15.04.2013 | UK Tech

A hoaxer who hacked a local news station in America and broadcast footage of a zombie apocalypse also managed to hack the national emergency alert sys...

29c3: Hacking Politics

Eva Blum-Dumontet | Posted 22.03.2013 | UK Tech
Eva Blum-Dumontet

Every year at the end of December, computer hackers from all over the world gather in Germany - this time in Hamburg - for the Chaos Communication Congress, four days of talks, meetings and workshops.

Angry 'Hacker' Threatens ISP Owner With Axe

Huffington Post UK | Michael Rundle | Posted 17.09.2012 | UK Tech

A man in Adelaide has admitted hacking an internet service provider - in more ways than one. Bryce Kingsley Quilley, from southern Australia, local...

Blair Email Hacker TriCk Facing Jail Time After Pleading Guilty

Huffington Post UK | Michael Rundle | Posted 31.08.2012 | UK Tech

The former leader of the hacking group known as TeaMp0isoN faces jail after pleading guilty to stealing Tony Blair's personal details from an aide's e...