UK Hackers

When Imitation Is Not The Sincerest Form Of Flattery

Alastair Paterson | Posted 27.03.2017 | UK Tech
Alastair Paterson

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

Decoding The Minds Of Hackers

Chris Pogue | Posted 20.03.2017 | UK Tech
Chris Pogue

Decoding the minds of hackers means we're developing the best solution to real life circumstances.

Why Having 'Geek Gap' Isn't Fatal

Vivi Friedgut | Posted 17.03.2017 | UK Tech
Vivi Friedgut

The right tech-head at the table is key to contributing to the view that anything is possible while viewing the perspective through the prism of client desires and commercial imperatives. As in all parts of the business, the right mind, the right experience and the right zeal moves us from fit for purpose to frigging fantastic

Hacking; The Threat That Isn't Going Away

Thomas Fischer | Posted 15.03.2017 | UK Tech
Thomas Fischer

We'll be OK, right? Wrong. Like it or not, the threat is all around us. And growing. It's no longer the isolated, odd geek in his bedroom who lives on a diet of pizza and computer code. Today, it's about power and money with both things driving an explosion in the number of active hackers.

Everyone Should Be A Hacker - And This Is Why

Jacob Lindsay | Posted 06.03.2017 | UK Tech
Jacob Lindsay

Perhaps the question for everyone today is not 'why hack?' but rather what's your hack? In a time of extreme instability and change, perhaps the smartest place to be is one that welcomes interruption and self-review

Security Witchcraft And Voodoo

Alastair Paterson | Posted 09.02.2017 | UK Tech
Alastair Paterson

Many people were this week startled by reports that GCHQ technical director Dr Ian Levy had apparently claimed that security firms exaggerated the thr...

The Five Key Steps To Take After A Security Breach

Kevin Dowd | Posted 08.12.2016 | UK Tech
Kevin Dowd

Developing and implementing a security incident response plan can be time consuming and often costly - two things most organisations do not have. Without a response plan, incidents can escalate quickly and the impact can be severe. An incident response plan gives organisations a much better chance of isolating and controlling an incident in a timely and cost effective manner.

Tech-Savvy Young People Needed To Plug Widening Skills Gap

David Emm | Posted 23.11.2016 | UK Tech
David Emm

Whether as masterminds of these attacks or foot soldiers in the pay of criminal gangs, teenager hackers have been linked with many high profile cybercrimes in recent years. In fact, the frequency of teenage cyber-attacks is growing as each generation's competency grows

The Three Mobile Attack Proves We Need To Train Everyone To Be A Barrier To Breaches

Graham Hunter | Posted 23.11.2016 | UK Tech
Graham Hunter

If businesses want to prevent attacks like this happening, they need to ensure that everyone has basic cyber hygiene: that they know the basics to prevent a breach, how to spot potential attacks and understand the implications of their actions on the wider company, and even economy.

Defence Against Cyber Threats Close To Home And Out Of This World

Geoff Smith | Posted 16.11.2016 | UK Tech
Geoff Smith

As the threat of cybercrime intensifies both on and around the planet, there's never been a more important time for organisations to batten down the hatches to protect themselves. By adopting these types of approaches however, businesses will be able to strengthen their defence and ensure they don't become the next cyber-attack headline.

A Day In The Life Of An Ethical Hacker

Robert Page | Posted 11.11.2016 | UK Tech
Robert Page

Ethical hacking services are increasingly being recognised as a great way for businesses to unearth security weaknesses before they can be exploited by online criminals. Organisations adopting a proactive approach to threat identification invariably find that this is much easier than trying to manage the fall out of a full blown cyber incident, which can cause huge financial losses and reputational damage.

Government Must Think Beyond 2020 And Tackle Skills Gap To Ensure UK Cyber Safety

Gad Elkin | Posted 07.11.2016 | UK Tech
Gad Elkin

Although the Government has yet to disclose where much of the £1.9bn will be invested, too few of the details that were announced suggested the Government has this longer term, education-focussed, thinking in mind

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

Hackers Broke The Internet This Weekend Using Your Home Gadgets As A Weapon

The Huffington Post | Thomas Tamblyn | Posted 24.10.2016 | UK Tech

A major cyberattack took place over the weekend, it was targeted at a company called Dyn and while you’ve probably never heard of them until now, th...

Social Engineering: Securing Workers In The Digital Age

Robert Arandjelovic | Posted 18.10.2016 | UK Tech
Robert Arandjelovic

Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.

A Hacker's Eye View: Targeted Attacks - Part One

Lawrence Munro | Posted 28.09.2016 | UK Tech
Lawrence Munro

The risk of a cyber-attack has become an unfortunate fact of life in today's digital world. However, while businesses of all sizes and in all sectors should certainly be aware they are under threat, just like all thieves, cyber criminals have their preferred targets and methods.

Brazzers Porn Site Hack Exposes Personal Details Of 800,000 Users

The Huffington Post | Oscar Williams | Posted 06.09.2016 | UK Tech

Hackers have exposed the email addresses, usernames and passwords of nearly 800,000 users of the porn site Brazzers. The data was stolen from an asso...

The Rise In Ransomware: How To Keep Your Data Out Of The Wrong Hands

Gad Elkin | Posted 23.08.2016 | UK Tech
Gad Elkin

Whilst attacks have increased in intensity, hacker groups have also chosen to flex their digital muscles by launching attacks to a very specific intensity, demonstrating their capabilities to victims.

'Project Sauron' Malware Secretly Spied On Victims For Five Years

The Huffington Post | Oscar Williams | Posted 09.08.2016 | UK Tech

A covert hacking group spied on targets in Russia, China, Iran, Sweden, Belgium and Rwanda for more than five years without being detected, researcher...

Hackers Can Actually See What You're Typing On Some Wireless Keyboards

The Huffington Post | Thomas Tamblyn | Posted 27.07.2016 | UK Tech

The words being typed on a wireless keyboard can be easily seen and stolen by hackers, a cybersecurity firm has warned. The worrying revelation was ma...

Pornhub Gets Hacked, Revealing Users' Preferences

The Huffington Post | Thomas Tamblyn | Posted 26.07.2016 | UK Tech

Pornhub, one of the world’s largest porn sites has had its website hacked, revealing millions of users’ personal preferences. Before you start fur...

Cybercriminals Are 'Outpacing The UK's Collective Response'

Press Association | Oscar Williams | Posted 07.07.2016 | UK Tech

Cybercriminals are scaling their technical capabilities so quickly that UK law enforcement and businesses can’t keep up, the National Crime Agency (...

Criminal Children: Could Your Teenager Be a Hacker?

David Emm | Posted 22.02.2017 | UK Tech
David Emm

There are some signs parents can look for to assess whether their children are getting involved in dangerous activities online - here are some questions to consider...

The Biggest Data Breaches of 2015

David Emm | Posted 14.12.2016 | UK Tech
David Emm

This year has seen a steady stream of security breaches, so much so that the news announcements almost seem routine. It's hardly surprising though, as our personal information is such a valuable commodity - not just for companies, but unfortunately for cybercriminals too.

Toy Hacks: Another Example of Why Security Needs an Overhaul

Graham Welch | Posted 09.12.2016 | UK Tech
Graham Welch

From baby monitors that allow parents to watch their infants remotely, to smart talking dolls, which connect to a database to answer kids' questions, the same connectivity seen in adult gadgets is now reaching our children. But what happens when hackers gain access to that data?