UK Hackers

Hackers Claim NASA Is About To Reveal They've Already Found Alien Life

The Huffington Post | Sophie Gallagher | Posted 26.06.2017 | UK Tech

Anonymous Global have claimed that NASA is “on the verge” of telling the world that they have discovered alien life in the cosmos. And not just ...

Hackers Have Reportedly Stolen A Digital Copy Of The New Pirates Of The Caribbean Film

The Huffington Post | Thomas Tamblyn | Posted 16.05.2017 | UK Tech

Hackers have reportedly stolen a digital copy of the new Disney film Pirates of the Caribbean: Dead Men Tell No Tales and are holding it to ransom, ac...

Defending Yourself Against A Cyber-Attack - What You Need To Know

John Grimm | Posted 09.05.2017 | UK Tech
John Grimm

These worrying statistics highlight just how vulnerable the business community remains to data breaches, even after an unprecedented period of public disclosures. Britain's businesses cannot continue to treat cyber security as a box-ticking exercise and risk falling foul of harmful attacks.

How Secure Is Your Car Cleaning Firm?

Alastair Paterson | Posted 24.04.2017 | UK Tech
Alastair Paterson

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

Received A Text Message From Your Bank Recently? A New Scam Is Tricking People Into Emptying Their Accounts

The Huffington Post | Thomas Tamblyn | Posted 12.04.2017 | UK Tech

Received a text from your bank recently? A new ‘smishing’ scam is convincing people to hand over their bank details by sending text messages disgu...

The Unknown Known - How Employee Behaviour Can Ensure Cybersecurity Success

William Culbert | Posted 12.04.2017 | UK Tech
William Culbert

The average person today has become profoundly more technical, utilising a variety of devices, technologies and cloud solutions in their daily lives. Whether a person is backing up photos to iCloud or logging into social media from an iPad or smartphone, the average security perimeter of an individual has moved far beyond email address, laptops and a favourite website.

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

Decoding The Minds Of Hackers

Chris Pogue | Posted 20.03.2017 | UK Tech
Chris Pogue

Decoding the minds of hackers means we're developing the best solution to real life circumstances.

Why Having 'Geek Gap' Isn't Fatal

Vivi Friedgut | Posted 17.03.2017 | UK Tech
Vivi Friedgut

The right tech-head at the table is key to contributing to the view that anything is possible while viewing the perspective through the prism of client desires and commercial imperatives. As in all parts of the business, the right mind, the right experience and the right zeal moves us from fit for purpose to frigging fantastic

Hacking; The Threat That Isn't Going Away

Thomas Fischer | Posted 15.03.2017 | UK Tech
Thomas Fischer

We'll be OK, right? Wrong. Like it or not, the threat is all around us. And growing. It's no longer the isolated, odd geek in his bedroom who lives on a diet of pizza and computer code. Today, it's about power and money with both things driving an explosion in the number of active hackers.

Everyone Should Be A Hacker - And This Is Why

Jacob Lindsay | Posted 06.03.2017 | UK Tech
Jacob Lindsay

Perhaps the question for everyone today is not 'why hack?' but rather what's your hack? In a time of extreme instability and change, perhaps the smartest place to be is one that welcomes interruption and self-review

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

Tech-Savvy Young People Needed To Plug Widening Skills Gap

David Emm | Posted 23.11.2016 | UK Tech
David Emm

Whether as masterminds of these attacks or foot soldiers in the pay of criminal gangs, teenager hackers have been linked with many high profile cybercrimes in recent years. In fact, the frequency of teenage cyber-attacks is growing as each generation's competency grows

The Three Mobile Attack Proves We Need To Train Everyone To Be A Barrier To Breaches

Graham Hunter | Posted 23.11.2016 | UK Tech
Graham Hunter

If businesses want to prevent attacks like this happening, they need to ensure that everyone has basic cyber hygiene: that they know the basics to prevent a breach, how to spot potential attacks and understand the implications of their actions on the wider company, and even economy.

Defence Against Cyber Threats Close To Home And Out Of This World

Geoff Smith | Posted 16.11.2016 | UK Tech
Geoff Smith

As the threat of cybercrime intensifies both on and around the planet, there's never been a more important time for organisations to batten down the hatches to protect themselves. By adopting these types of approaches however, businesses will be able to strengthen their defence and ensure they don't become the next cyber-attack headline.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.

Government Must Think Beyond 2020 And Tackle Skills Gap To Ensure UK Cyber Safety

Gad Elkin | Posted 07.11.2016 | UK Tech
Gad Elkin

Although the Government has yet to disclose where much of the £1.9bn will be invested, too few of the details that were announced suggested the Government has this longer term, education-focussed, thinking in mind

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

Hackers Broke The Internet This Weekend Using Your Home Gadgets As A Weapon

The Huffington Post | Thomas Tamblyn | Posted 24.10.2016 | UK Tech

A major cyberattack took place over the weekend, it was targeted at a company called Dyn and while you’ve probably never heard of them until now, th...

Social Engineering: Securing Workers In The Digital Age

Robert Arandjelovic | Posted 18.10.2016 | UK Tech
Robert Arandjelovic

Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.

A Hacker's Eye View: Targeted Attacks - Part One

Lawrence Munro | Posted 28.09.2016 | UK Tech
Lawrence Munro

The risk of a cyber-attack has become an unfortunate fact of life in today's digital world. However, while businesses of all sizes and in all sectors should certainly be aware they are under threat, just like all thieves, cyber criminals have their preferred targets and methods.

Brazzers Porn Site Hack Exposes Personal Details Of 800,000 Users

The Huffington Post | Oscar Williams | Posted 06.09.2016 | UK Tech

Hackers have exposed the email addresses, usernames and passwords of nearly 800,000 users of the porn site Brazzers. The data was stolen from an asso...

The Rise In Ransomware: How To Keep Your Data Out Of The Wrong Hands

Gad Elkin | Posted 23.08.2016 | UK Tech
Gad Elkin

Whilst attacks have increased in intensity, hacker groups have also chosen to flex their digital muscles by launching attacks to a very specific intensity, demonstrating their capabilities to victims.

'Project Sauron' Malware Secretly Spied On Victims For Five Years

The Huffington Post | Oscar Williams | Posted 09.08.2016 | UK Tech

A covert hacking group spied on targets in Russia, China, Iran, Sweden, Belgium and Rwanda for more than five years without being detected, researcher...