UK Hackers

Tech-Savvy Young People Needed To Plug Widening Skills Gap

David Emm | Posted 23.11.2016 | UK Tech
David Emm

Whether as masterminds of these attacks or foot soldiers in the pay of criminal gangs, teenager hackers have been linked with many high profile cybercrimes in recent years. In fact, the frequency of teenage cyber-attacks is growing as each generation's competency grows

The Three Mobile Attack Proves We Need To Train Everyone To Be A Barrier To Breaches

Graham Hunter | Posted 23.11.2016 | UK Tech
Graham Hunter

If businesses want to prevent attacks like this happening, they need to ensure that everyone has basic cyber hygiene: that they know the basics to prevent a breach, how to spot potential attacks and understand the implications of their actions on the wider company, and even economy.

Defence Against Cyber Threats Close To Home And Out Of This World

Geoff Smith | Posted 16.11.2016 | UK Tech
Geoff Smith

As the threat of cybercrime intensifies both on and around the planet, there's never been a more important time for organisations to batten down the hatches to protect themselves. By adopting these types of approaches however, businesses will be able to strengthen their defence and ensure they don't become the next cyber-attack headline.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.

Government Must Think Beyond 2020 And Tackle Skills Gap To Ensure UK Cyber Safety

Gad Elkin | Posted 07.11.2016 | UK Tech
Gad Elkin

Although the Government has yet to disclose where much of the £1.9bn will be invested, too few of the details that were announced suggested the Government has this longer term, education-focussed, thinking in mind

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

Hackers Broke The Internet This Weekend Using Your Home Gadgets As A Weapon

The Huffington Post | Thomas Tamblyn | Posted 24.10.2016 | UK Tech

A major cyberattack took place over the weekend, it was targeted at a company called Dyn and while you’ve probably never heard of them until now, th...

Social Engineering: Securing Workers In The Digital Age

Robert Arandjelovic | Posted 18.10.2016 | UK Tech
Robert Arandjelovic

Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.

A Hacker's Eye View: Targeted Attacks - Part One

Lawrence Munro | Posted 28.09.2016 | UK Tech
Lawrence Munro

The risk of a cyber-attack has become an unfortunate fact of life in today's digital world. However, while businesses of all sizes and in all sectors should certainly be aware they are under threat, just like all thieves, cyber criminals have their preferred targets and methods.

Brazzers Porn Site Hack Exposes Personal Details Of 800,000 Users

The Huffington Post | Oscar Williams | Posted 06.09.2016 | UK Tech

Hackers have exposed the email addresses, usernames and passwords of nearly 800,000 users of the porn site Brazzers. The data was stolen from an asso...

The Rise In Ransomware: How To Keep Your Data Out Of The Wrong Hands

Gad Elkin | Posted 23.08.2016 | UK Tech
Gad Elkin

Whilst attacks have increased in intensity, hacker groups have also chosen to flex their digital muscles by launching attacks to a very specific intensity, demonstrating their capabilities to victims.

'Project Sauron' Malware Secretly Spied On Victims For Five Years

The Huffington Post | Oscar Williams | Posted 09.08.2016 | UK Tech

A covert hacking group spied on targets in Russia, China, Iran, Sweden, Belgium and Rwanda for more than five years without being detected, researcher...

Hackers Can Actually See What You're Typing On Some Wireless Keyboards

The Huffington Post | Thomas Tamblyn | Posted 27.07.2016 | UK Tech

The words being typed on a wireless keyboard can be easily seen and stolen by hackers, a cybersecurity firm has warned. The worrying revelation was ma...

Pornhub Gets Hacked, Revealing Users' Preferences

The Huffington Post | Thomas Tamblyn | Posted 26.07.2016 | UK Tech

Pornhub, one of the world’s largest porn sites has had its website hacked, revealing millions of users’ personal preferences. Before you start fur...

Cybercriminals Are 'Outpacing The UK's Collective Response'

Press Association | Oscar Williams | Posted 07.07.2016 | UK Tech

Cybercriminals are scaling their technical capabilities so quickly that UK law enforcement and businesses can’t keep up, the National Crime Agency (...

Criminal Children: Could Your Teenager Be a Hacker?

David Emm | Posted 23.02.2016 | UK Tech
David Emm

There are some signs parents can look for to assess whether their children are getting involved in dangerous activities online - here are some questions to consider...

The Biggest Data Breaches of 2015

David Emm | Posted 15.12.2015 | UK Tech
David Emm

This year has seen a steady stream of security breaches, so much so that the news announcements almost seem routine. It's hardly surprising though, as our personal information is such a valuable commodity - not just for companies, but unfortunately for cybercriminals too.

Toy Hacks: Another Example of Why Security Needs an Overhaul

Graham Welch | Posted 10.12.2015 | UK Tech
Graham Welch

From baby monitors that allow parents to watch their infants remotely, to smart talking dolls, which connect to a database to answer kids' questions, the same connectivity seen in adult gadgets is now reaching our children. But what happens when hackers gain access to that data?

How to Protect Yourself Against the Hackers

Gary Newe | Posted 02.09.2016 | UK Tech
Gary Newe

The number of data breaches has continued to grow in 2015. Barely a day goes by without a company or country falling victim to a cyber-security attack. Some of the high profile attacks we've witnessed this year include Github, Uber, and Chris Froome's personal training data.

Hackers Lizard Squad Get Revenge By Knocking Out The National Crime Agency's Website

The Huffington Post UK | Thomas Tamblyn | Posted 01.09.2015 | UK Tech

The hacking collective known as Lizard Squad have taken down the National Crime Agency website in a revenge attack following the arrest of six individ...

If You've Ever Had An Ashley Madison Affair You Might Want To Change Your Credit Card Details

The Huffington Post UK | Nitya Rajan | Posted 24.08.2015 | UK Tech

Hackers who stole personal details of more than 37 million members of Ashley Madison -- the dating site that lets people have extramarital affairs -- ...

This Couple Hacked A TrackingPoint Sniper Rifle To Prove A Very DEADLY Point

The Huffington Post UK | Nitya Rajan | Posted 30.07.2015 | UK Tech

The world of connected weapons just got a little darker. In an experiment for Wired, security researchers Runa Sandvik and Michael Auger hacked a T...

Keep Up or Get Caught Out - Lessons From the Ashley Madison Hack

Gary Newe | Posted 24.07.2016 | UK Tech
Gary Newe

As the lines between the professional and social use of technology continue to blur, it is vital that we start to really recognise the significance of these attacks, how likely they are and how damaging they can be.

Hackers Just Hijacked A Jeep Cherokee And It's TERRIFYING

The Huffington Post UK | Nitya Rajan | Posted 22.07.2015 | UK Tech

"Remember Andy," they said "no matter what happens, don’t panic.” Andy Greenberg is a reporter for Wired who had his Jeep Cherokee hijacked by ...

Things Are About To Get Even Worse For Cheaters Who Used Affairs Site

The Huffington Post UK | Nitya Rajan | Posted 21.07.2015 | UK Tech

An 'insider' has told Sky News that the Ashley Madison hackers could be selling off their acquired data, including personal names and addresses of the...