Malware

Real Life Imitating Art

David Emm | Posted 03.10.2014 | UK Tech
David Emm

The current mechanisms for real-time tracking, detection, analysis and resolution of cyber-threats for computers and mobile devices will not be enough on their own - it could take just seconds to disable or destroy a connected vehicle, with disastrous consequences.

Russian Group Hacking: What We Know and What We Can Learn

Gary Newe | Posted 06.10.2014 | UK Tech
Gary Newe

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.

It's Not Quite 'Game Over' for GOZeus and CryptoLocker - But You Can Stay Protected

David Emm | Posted 18.08.2014 | UK Tech
David Emm

The names GameOver Zeus and ransomware CryptoLocker may be familiar to you due to recent stories in the news. Although the terms may seem alien, the issue is very real and has the ability to affect each and every one of us.

A Week of Cyber Attacks - What Can Be Done?

Gary Newe | Posted 13.08.2014 | UK Tech
Gary Newe

DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.

Small Business Has More at Stake Than Most

Mike Foreman | Posted 10.08.2014 | UK Tech
Mike Foreman

Unsurprisingly this caused widespread alarm among thousands of computer users everywhere. But it's small business that should pay closest attention because they have more at stake than most. It's not just that the safety of their financial data is crucial to their prosperity.

Global Arrests Made In 'Webcam Spying' Malware Scam

The Huffington Post UK | Posted 20.05.2014 | UK Tech

Nearly 100 people from 16 different countries have been arrested for a malware scam that allowed hackers to spy on people via the unsuspecting users o...

The Death of Anti-Virus Software: Greatly Exaggerated?

David Emm | Posted 09.07.2014 | UK Tech
David Emm

A lot of the discussions around this statement have been very technical, but at a basic level, what does this mean for your PC, laptop or mobile device? Is there any point in installing anti-virus software anymore? And are you less safe than you thought you were last week?

This Virus Literally Holds Your Phone To Ransom

The Huffington Post UK | Posted 09.05.2014 | UK Tech

Android malware is now coming right out and demanding money from its victims. Reports are emerging that so-called 'ransomware' is asking victims to...

Coping With Cyber Threats : An Agenda for Corporates

Preetam Kaushik | Posted 20.05.2014 | UK Tech
Preetam Kaushik

Cyber threats are growing virally, necessitating a new approach in combating them by the corporate world, who even today regard antivirus programs and firewalls as a baseline for their security efforts.

Demystifying TOR

David Emm | Posted 10.05.2014 | UK Tech
David Emm

Tor (short for The Onion Router) is software designed to allow someone to remain anonymous when accessing the Internet. It has been around for some time, but for many years was used mainly by experts and enthusiasts. However, Edward Snowden's revelations have resulted in a surge of interest in Tor as more people seek online anonymity.

Thinking About Security: Security by Numbers

Jon Geater | Posted 04.05.2014 | UK Tech
Jon Geater

We all live multiple lives - as private individuals, national citizens, and corporate employees - and all those lives need to develop the same intuitive sense of security in the digital world as we already have in the physical world.

Some Scary Numbers...but Don't Have Nightmares!

David Emm | Posted 15.03.2014 | UK Tech
David Emm

315,000 new samples are analysed every day. Browser-based attacks nearly doubled to 1,700,870,654.Offline attacks (via USB flash-drive, for example) totalled 3 billion, from a total of 1.8 million malicious and potentially unwanted programs.

Encrypting Your Data Is a Good Thing... Unless Someone Else Has Done It

David Emm | Posted 16.02.2014 | UK Tech
David Emm

'Ransomware' Trojans, as the name suggests, are designed to directly extort money from their victims. They may block access to a computer's file system, or encrypt data that's stored on it and then ask for a payment to release the data.

Why You Should Buy Internet Security and a Winter Coat

Lucy Karsten | Posted 29.01.2014 | UK Tech
Lucy Karsten

'You've got a virus,' my little sister said finally, sneering at me in a way that made it perfectly clear that she considered the whole matter beneath her. 'What internet security provider are you using?' I laughed, because internet security software is like ironing, or packing the night before a flight- done only by the neurotic or the elderly.

Strange Virus Might Be Able To Infect PCs Through Their Speakers

Huffington Post UK | Posted 23.01.2014 | UK Tech

A very strange (and worrying) new form of computer virus appears to be able to infect your PC through its speakers. The rootkit virus is apparently...

What Is Malware? (Part two)

Allen Scott | Posted 16.11.2013 | UK Tech
Allen Scott

No piece of software is perfect or can ever be perfect. These imperfections within the code can be exploited by hackers to gain access to your computer. Once an exploit is found, it is patched by the software company which then sends an update to its users. This is the update that you keep ignoring.

What is Malware? (Part One)

Allen Scott | Posted 03.11.2013 | UK Tech
Allen Scott

Malware is malicious software which has been developed by someone (or some organisation) to cause disruption or, more commonly now, to earn them money. Your money. It wasn't always this way. Originally, computer viruses were created by computer enthusiasts almost as a game to see how many PCs they could infect.

SMBs Expect Lenders to Cover Cybercrime Losses - Don't Bank On It!

Mike Foreman | Posted 30.07.2013 | UK Tech
Mike Foreman

The most common threat to businesses is virus infection says the FSB, which 20 per cent of respondents said they have fallen victim to. A further eight per cent have been a victim of hacking, while five per cent have suffered security breaches.

Working Together to Combat Cybercrime

David Emm | Posted 10.07.2013 | UK Tech
David Emm

Cybercrime has become a well-established feature of today's world. For the most part, this takes the form of random, speculative attacks designed to steal personal information from anyone unlucky enough to fall victim to the attack.

The Next Big Thing in Security Is...

Graham Welch | Posted 23.06.2013 | UK Tech
Graham Welch

Today the bad guys are increasingly well-financed, professional and work hard to develop new ways to get through defences. At the same time, we increasingly live our lives online which means the information and data we hold on our PCs and networks are valuable assets that can be traded and used.

Welcome to Generation Hack

Andrew Tipp | Posted 31.05.2013 | UK Tech
Andrew Tipp

You don't need to be a web trendster or pop culture vulture to recognise we're on the cusp of a new age; a fresh wave of inquisitive HTML meddlers. Never mind Generation X. Forget Generation Y. This isn't Generation Z. It's Generation Hack.

Fleeing the Freeze? Don't Leave Your Mobile Security Out in the Cold

Gary Hibberd | Posted 27.05.2013 | UK Tech
Gary Hibberd

Most phones are connected to many different websites all of which contain our personal details and many are also connected to (or contain) personal and work email accounts and documents. Cyber security is not just a plot in a James Bond movie, it's a real threat.

How to Avoid 'Honey Traps' When Seeking Your Soul Mate Online

David Emm | Posted 16.04.2013 | UK Tech
David Emm

The popularity of online dating sites such as match.com, eharmony and plentyoffish could hardly escape the attention of fraudsters. Spam emails imitating notifications from popular dating sites are widespread in almost all major languages.

Demystifying Rocra

David Emm | Posted 26.03.2013 | UK Tech
David Emm

If you have stumbled across the phrase 'Red October' in the past few weeks, you may think it sounds like an operation from a John le Carré novel. In ...

US Developer Rumbled Outsourcing Job To China - So He Could Spend The Day Browsing Facebook, Reddit, Ebay & LinkedIn

Huffington Post UK | Sara C Nelson | Posted 17.01.2013 | UK Tech

A US-based software developer has been caught outsourcing his work to China for less than a fifth of his six figure salary - while he spent his day br...