UK Hackers

Online Safety: A Lesson All Students Need To Learn

Peter Turner | Posted 03.10.2017 | UK Tech
Peter Turner

We live in an age where there are just as many people looking to do you harm online as there are in real life and it's important for students to stay vigilant. While it's essential to enjoy their new home, they need to ensure their personal details are secure and that they're the only one that can truly 'find themselves' online.

Security Does Not Equal Privacy

Yossi Atias | Posted 15.09.2017 | UK Tech
Yossi Atias

There's a misconception among trusting mobile and Wi-Fi network users that often leaves personal data dangling on a hook over a sea of ready hackers. This misguided belief gives consumers a sense of relief when they purchase software that supposedly serves as an ultimate protector of everything.

Find Out If Your Password Has Been Hacked Using This Website

The Huffington Post | Thomas Tamblyn | Posted 09.08.2017 | UK Tech

With hackers harvesting millions of login details every single year the likelihood that one of your accounts has been compromised is increasing expone...

The Game Of Thrones Hackers Have Released A Ransom Note And Another Leaked Script

The Huffington Post | Thomas Tamblyn | Posted 08.08.2017 | UK Tech

A group of hackers who uploaded the script of a previously unseen Game of Thrones episode are now demanding a ransom payment from HBO. The hackers cla...

The Rise Of The No-Frills Hacker

Nicholas Shaw | Posted 04.08.2017 | UK Tech
Nicholas Shaw

It looks innocent enough - a receipt from your favourite high street shop, a file to review from a colleague or an alert from your bank or gas company that you have a statement to review or bill to pay. But something rather more sinister could be sitting in your inbox, waiting to be clicked.

How Much Would Your Spotify Account Be Worth?

Nicholas Shaw | Posted 27.07.2017 | UK Tech
Nicholas Shaw

You can buy pretty much anything on the internet. You just need to know where to look. For most of us, the only times we'd venture off the beaten track would be to find a specialist birthday gift perhaps, or a niche item you spotted on Pinterest, Facebook or Reddit. But what might surprise you is that in some places, your digital belongings could also be listed for sale - all at rock bottom prices.

If You See This Email From WhatsApp, Delete It

The Huffington Post | Thomas Tamblyn | Posted 26.07.2017 | UK Tech

Another day and so it’s time for another WhatsApp scam and this latest one is proving to be a bit of a nuisance. Action Fraud has alerted its users ...

Are Cyber Thieves And Snoopers Turning Your Smart Home Against You?

Peter Turner | Posted 14.07.2017 | UK Tech
Peter Turner

As our homes become jam-packed with smarter devices in the years to come, they may help to makes our lives easier. At the same time, if they are not secured, they also can make the lives of cyber criminals easier by giving access to our whole network and all the devices on it. To be truly safe in our smart homes then we need to start applying the same security principles we already do with our mobile phones and computers.

Hackers Claim NASA Is About To Reveal They've Already Found Alien Life

The Huffington Post | Sophie Gallagher | Posted 26.06.2017 | UK Tech

Anonymous Global have claimed that NASA is “on the verge” of telling the world that they have discovered alien life in the cosmos. And not just ...

Hackers Have Reportedly Stolen A Digital Copy Of The New Pirates Of The Caribbean Film

The Huffington Post | Thomas Tamblyn | Posted 16.05.2017 | UK Tech

Hackers have reportedly stolen a digital copy of the new Disney film Pirates of the Caribbean: Dead Men Tell No Tales and are holding it to ransom, ac...

Defending Yourself Against A Cyber-Attack - What You Need To Know

John Grimm | Posted 09.05.2017 | UK Tech
John Grimm

These worrying statistics highlight just how vulnerable the business community remains to data breaches, even after an unprecedented period of public disclosures. Britain's businesses cannot continue to treat cyber security as a box-ticking exercise and risk falling foul of harmful attacks.

How Secure Is Your Car Cleaning Firm?

Alastair Paterson | Posted 24.04.2017 | UK Tech
Alastair Paterson

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

Received A Text Message From Your Bank Recently? A New Scam Is Tricking People Into Emptying Their Accounts

The Huffington Post | Thomas Tamblyn | Posted 12.04.2017 | UK Tech

Received a text from your bank recently? A new ‘smishing’ scam is convincing people to hand over their bank details by sending text messages disgu...

The Unknown Known - How Employee Behaviour Can Ensure Cybersecurity Success

William Culbert | Posted 12.04.2017 | UK Tech
William Culbert

The average person today has become profoundly more technical, utilising a variety of devices, technologies and cloud solutions in their daily lives. Whether a person is backing up photos to iCloud or logging into social media from an iPad or smartphone, the average security perimeter of an individual has moved far beyond email address, laptops and a favourite website.

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

Decoding The Minds Of Hackers

Chris Pogue | Posted 20.03.2017 | UK Tech
Chris Pogue

Decoding the minds of hackers means we're developing the best solution to real life circumstances.

Why Having 'Geek Gap' Isn't Fatal

Vivi Friedgut | Posted 17.03.2017 | UK Tech
Vivi Friedgut

The right tech-head at the table is key to contributing to the view that anything is possible while viewing the perspective through the prism of client desires and commercial imperatives. As in all parts of the business, the right mind, the right experience and the right zeal moves us from fit for purpose to frigging fantastic

Hacking; The Threat That Isn't Going Away

Thomas Fischer | Posted 15.03.2017 | UK Tech
Thomas Fischer

We'll be OK, right? Wrong. Like it or not, the threat is all around us. And growing. It's no longer the isolated, odd geek in his bedroom who lives on a diet of pizza and computer code. Today, it's about power and money with both things driving an explosion in the number of active hackers.

Everyone Should Be A Hacker - And This Is Why

Jacob Lindsay | Posted 06.03.2017 | UK Tech
Jacob Lindsay

Perhaps the question for everyone today is not 'why hack?' but rather what's your hack? In a time of extreme instability and change, perhaps the smartest place to be is one that welcomes interruption and self-review

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

Tech-Savvy Young People Needed To Plug Widening Skills Gap

David Emm | Posted 23.11.2016 | UK Tech
David Emm

Whether as masterminds of these attacks or foot soldiers in the pay of criminal gangs, teenager hackers have been linked with many high profile cybercrimes in recent years. In fact, the frequency of teenage cyber-attacks is growing as each generation's competency grows

The Three Mobile Attack Proves We Need To Train Everyone To Be A Barrier To Breaches

Graham Hunter | Posted 23.11.2016 | UK Tech
Graham Hunter

If businesses want to prevent attacks like this happening, they need to ensure that everyone has basic cyber hygiene: that they know the basics to prevent a breach, how to spot potential attacks and understand the implications of their actions on the wider company, and even economy.

Defence Against Cyber Threats Close To Home And Out Of This World

Geoff Smith | Posted 16.11.2016 | UK Tech
Geoff Smith

As the threat of cybercrime intensifies both on and around the planet, there's never been a more important time for organisations to batten down the hatches to protect themselves. By adopting these types of approaches however, businesses will be able to strengthen their defence and ensure they don't become the next cyber-attack headline.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.