Coping With Cyber Threats : An Agenda for Corporates

Preetam Kaushik | Posted 21.03.2014 | UK Tech
Preetam Kaushik

Cyber threats are growing virally, necessitating a new approach in combating them by the corporate world, who even today regard antivirus programs and firewalls as a baseline for their security efforts.

Demystifying TOR

David Emm | Posted 11.03.2014 | UK Tech
David Emm

Tor (short for The Onion Router) is software designed to allow someone to remain anonymous when accessing the Internet. It has been around for some time, but for many years was used mainly by experts and enthusiasts. However, Edward Snowden's revelations have resulted in a surge of interest in Tor as more people seek online anonymity.

Thinking About Security: Security by Numbers

Jon Geater | Posted 04.03.2014 | UK Tech
Jon Geater

We all live multiple lives - as private individuals, national citizens, and corporate employees - and all those lives need to develop the same intuitive sense of security in the digital world as we already have in the physical world.

Some Scary Numbers...but Don't Have Nightmares!

David Emm | Posted 15.03.2014 | UK Tech
David Emm

315,000 new samples are analysed every day. Browser-based attacks nearly doubled to 1,700,870,654.Offline attacks (via USB flash-drive, for example) totalled 3 billion, from a total of 1.8 million malicious and potentially unwanted programs.

Encrypting Your Data Is a Good Thing... Unless Someone Else Has Done It

David Emm | Posted 16.02.2014 | UK Tech
David Emm

'Ransomware' Trojans, as the name suggests, are designed to directly extort money from their victims. They may block access to a computer's file system, or encrypt data that's stored on it and then ask for a payment to release the data.

Why You Should Buy Internet Security and a Winter Coat

Lucy Karsten | Posted 29.01.2014 | UK Tech
Lucy Karsten

'You've got a virus,' my little sister said finally, sneering at me in a way that made it perfectly clear that she considered the whole matter beneath her. 'What internet security provider are you using?' I laughed, because internet security software is like ironing, or packing the night before a flight- done only by the neurotic or the elderly.

Strange Virus Might Be Able To Infect PCs Through Their Speakers

Huffington Post UK | Posted 23.01.2014 | UK Tech

A very strange (and worrying) new form of computer virus appears to be able to infect your PC through its speakers. The rootkit virus is apparently...

What Is Malware? (Part two)

Allen Scott | Posted 16.11.2013 | UK Tech
Allen Scott

No piece of software is perfect or can ever be perfect. These imperfections within the code can be exploited by hackers to gain access to your computer. Once an exploit is found, it is patched by the software company which then sends an update to its users. This is the update that you keep ignoring.

What is Malware? (Part One)

Allen Scott | Posted 03.11.2013 | UK Tech
Allen Scott

Malware is malicious software which has been developed by someone (or some organisation) to cause disruption or, more commonly now, to earn them money. Your money. It wasn't always this way. Originally, computer viruses were created by computer enthusiasts almost as a game to see how many PCs they could infect.

SMBs Expect Lenders to Cover Cybercrime Losses - Don't Bank On It!

Mike Foreman | Posted 30.07.2013 | UK Tech
Mike Foreman

The most common threat to businesses is virus infection says the FSB, which 20 per cent of respondents said they have fallen victim to. A further eight per cent have been a victim of hacking, while five per cent have suffered security breaches.

Working Together to Combat Cybercrime

David Emm | Posted 10.07.2013 | UK Tech
David Emm

Cybercrime has become a well-established feature of today's world. For the most part, this takes the form of random, speculative attacks designed to steal personal information from anyone unlucky enough to fall victim to the attack.

The Next Big Thing in Security Is...

Graham Welch | Posted 23.06.2013 | UK Tech
Graham Welch

Today the bad guys are increasingly well-financed, professional and work hard to develop new ways to get through defences. At the same time, we increasingly live our lives online which means the information and data we hold on our PCs and networks are valuable assets that can be traded and used.

Welcome to Generation Hack

Andrew Tipp | Posted 31.05.2013 | UK Tech
Andrew Tipp

You don't need to be a web trendster or pop culture vulture to recognise we're on the cusp of a new age; a fresh wave of inquisitive HTML meddlers. Never mind Generation X. Forget Generation Y. This isn't Generation Z. It's Generation Hack.

Fleeing the Freeze? Don't Leave Your Mobile Security Out in the Cold

Gary Hibberd | Posted 27.05.2013 | UK Tech
Gary Hibberd

Most phones are connected to many different websites all of which contain our personal details and many are also connected to (or contain) personal and work email accounts and documents. Cyber security is not just a plot in a James Bond movie, it's a real threat.

How to Avoid 'Honey Traps' When Seeking Your Soul Mate Online

David Emm | Posted 16.04.2013 | UK Tech
David Emm

The popularity of online dating sites such as, eharmony and plentyoffish could hardly escape the attention of fraudsters. Spam emails imitating notifications from popular dating sites are widespread in almost all major languages.

Demystifying Rocra

David Emm | Posted 26.03.2013 | UK Tech
David Emm

If you have stumbled across the phrase 'Red October' in the past few weeks, you may think it sounds like an operation from a John le Carré novel. In ...

US Developer Rumbled Outsourcing Job To China - So He Could Spend The Day Browsing Facebook, Reddit, Ebay & LinkedIn

Huffington Post UK | Sara C Nelson | Posted 17.01.2013 | UK Tech

A US-based software developer has been caught outsourcing his work to China for less than a fifth of his six figure salary - while he spent his day br...

Attack of the Hackers: The Evolution of Cybercrime

Sabi Phagura | Posted 09.03.2013 | UK Tech
Sabi Phagura

Don't let the New Year bring the expense of fixing a damaged computer, the stress of dealing with hacked credit card details or worse the unknown and undetected dangers. Since I got hacked last year, I made a promise to myself. I've fallen victim to cybercrime once before - I won't again.

Social Networking or Identity Sharing: What Information Should You Give Away Online?

David Emm | Posted 23.01.2013 | UK Tech
David Emm

There has been a lot of debate recently about how much information we should give away online. Just a couple of weeks ago, Cabinet Office Internet security chief, Andy Smith, publicly suggested that we should use fake details online in order to protect our security. But is this really the right approach to staying safe online?

Up To 8% Of Android Apps Leave Users Open To Data Theft, Report Says

Huffington Post UK | Michael Rundle | Posted 22.12.2012 | UK Tech

Many users of Google's market-leading Android smartphone operating system are being tricked into leaking their personal information, a report has foun...

Up To 8% Of Android Apps Leave Users Open To Data Theft, Report Says

Huffington Post UK | Michael Rundle | Posted 22.12.2012 | UK Tech

Many users of Google's market-leading Android smartphone operating system are being tricked into leaking their personal information, a report has foun...

Microsoft: PCs Infected With Viruses Before They Reach Customers

Huffington Post UK | Michael Rundle | Posted 13.11.2012 | UK Tech

UPDATE: The original version of this story states that PCs were being infected 'at the factory'. Microsoft's Digital Crimes Unit has clarified that th...

Michael Rundle

Zero Day: World's Most-Powerful Hacking Network Exposed - But Who Is Paying Them? | Michael Rundle | Posted 07.09.2012 | UK Tech

The inner-workings of the world's most powerful professional hacking group have been exposed. The so-called Elderwood group, known for launching an...

Scams Are a Sport This Summer

Raj Samani | Posted 03.10.2012 | UK Tech
Raj Samani

Email inboxes are highly predictable. Any newsworthy event, whether a natural disaster, major sporting event, or even celebrity gossip inevitably invokes an email from an entrepreneurial individual with unscrupulous principles promising you something of value in exchange for personal information...

Cyber Attack 'Forces Iranian Nuclear Computers To Play AC/DC At Full Volume'

Huffington Post UK | Michael Rundle | Posted 22.09.2012 | UK Tech

Cyber warfare has been taken to a new, hard rockin' level. According to one security expert, a computer virus has attacked computer systems in Iran...