Protecting Brand Me

Nicholas Shaw | Posted 15.09.2015 | UK Tech
Nicholas Shaw

Social media has revolutionised the way we communicate, engage and perceive the people around us. In an age where statuses, 'likes' and photo uploads document our every move, our identities and reputation are firmly shaped by our social presence.

How to Protect Yourself Against the Hackers

Gary Newe | Posted 03.09.2015 | UK Tech
Gary Newe

The number of data breaches has continued to grow in 2015. Barely a day goes by without a company or country falling victim to a cyber-security attack. Some of the high profile attacks we've witnessed this year include Github, Uber, and Chris Froome's personal training data.

Put 'Em Up! The Scourge of Ransomware

David Emm | Posted 21.05.2015 | UK Tech
David Emm

Whilst it is common for attackers to specify their rates in real-world currencies, such as US dollars, euros or rubles, cybercriminals usually prefer to be paid in Bitcoin, or via online payment services, as they offer a high level of anonymity.

The Global Fight Against Cybercrime

David Emm | Posted 29.06.2015 | UK Tech
David Emm

In today's connected world we are hugely dependent on IT. This is true of our personal lives: the majority of us now own multiple connected devices - traditional desktop computers, laptops, tablets and smartphones.

Who's Lurking in Your Mobile?

David Emm | Posted 01.06.2015 | UK Tech
David Emm

Technology is taking over every aspect of our daily lives, and as it does so we become exposed to the associated dangers. One of the biggest threats is the device we carry with us 24/7 - our smartphone.

Jack Sommers

What Happens To Crime On Christmas Day? | Jack Sommers | Posted 25.12.2014 | UK

There is a lot of received wisdom about the type of crimes that happen on Christmas Day - but the reality of December 25 is more complex. Most year...

Introducing Detekt - Has It Got the Spooks Spooked?

Tanya O'Carroll | Posted 24.01.2015 | UK
Tanya O'Carroll

'Detekt' is not the answer to the daunting and growing problem of unlawful government surveillance. But it is another small step on the road. Big brother is watching. At least in some cases, we can now see what he's looking at.

The Inhospitable Darkhotel

David Emm | Posted 12.01.2015 | UK Tech
David Emm

The cybercriminals behind Darkhotel have been operating for almost a decade, targeting thousands of victims across the globe. 90 per cent of the infections we have seen are in Japan, Taiwan, China, Russia and Hong Kong, but we have also seen infections in Germany, the USA, Indonesia, India, and Ireland.

The iPhone And China Aren't Getting On

The Huffington Post UK | Thomas Tamblyn | Posted 06.11.2014 | UK Tech

Apple's iPhone debut in China is not proving to be the smoothest of launches as a security firm in California has just discovered a major piece of mal...

Real Life Imitating Art

David Emm | Posted 03.12.2014 | UK Tech
David Emm

The current mechanisms for real-time tracking, detection, analysis and resolution of cyber-threats for computers and mobile devices will not be enough on their own - it could take just seconds to disable or destroy a connected vehicle, with disastrous consequences.

Russian Group Hacking: What We Know and What We Can Learn

Gary Newe | Posted 06.10.2014 | UK Tech
Gary Newe

A Russian group has hacked 1.2 billion usernames and passwords belonging to more than 500 million email addresses... Nowadays hackers actually get more value out of personal information as opposed to credit card details. In fact, one article even points out that Twitter account information is of more worth to a hacker than their credit card.

It's Not Quite 'Game Over' for GOZeus and CryptoLocker - But You Can Stay Protected

David Emm | Posted 18.08.2014 | UK Tech
David Emm

The names GameOver Zeus and ransomware CryptoLocker may be familiar to you due to recent stories in the news. Although the terms may seem alien, the issue is very real and has the ability to affect each and every one of us.

A Week of Cyber Attacks - What Can Be Done?

Gary Newe | Posted 13.08.2014 | UK Tech
Gary Newe

DDoS attacks are nothing new, with many high-profile attacks dominating the media over the last 12 months, but with well-known brands continuing to publicly feel the impact of attacks, they also show no sign of losing popularity with cyber criminals.

Small Business Has More at Stake Than Most

Mike Foreman | Posted 10.08.2014 | UK Tech
Mike Foreman

Unsurprisingly this caused widespread alarm among thousands of computer users everywhere. But it's small business that should pay closest attention because they have more at stake than most. It's not just that the safety of their financial data is crucial to their prosperity.

Global Arrests Made In 'Webcam Spying' Malware Scam

The Huffington Post UK | Posted 20.05.2014 | UK Tech

Nearly 100 people from 16 different countries have been arrested for a malware scam that allowed hackers to spy on people via the unsuspecting users o...

The Death of Anti-Virus Software: Greatly Exaggerated?

David Emm | Posted 09.07.2014 | UK Tech
David Emm

A lot of the discussions around this statement have been very technical, but at a basic level, what does this mean for your PC, laptop or mobile device? Is there any point in installing anti-virus software anymore? And are you less safe than you thought you were last week?

This Virus Literally Holds Your Phone To Ransom

The Huffington Post UK | Posted 09.05.2014 | UK Tech

Android malware is now coming right out and demanding money from its victims. Reports are emerging that so-called 'ransomware' is asking victims to...

Coping With Cyber Threats : An Agenda for Corporates

Preetam Kaushik | Posted 20.05.2014 | UK Tech
Preetam Kaushik

Cyber threats are growing virally, necessitating a new approach in combating them by the corporate world, who even today regard antivirus programs and firewalls as a baseline for their security efforts.

Demystifying TOR

David Emm | Posted 10.05.2014 | UK Tech
David Emm

Tor (short for The Onion Router) is software designed to allow someone to remain anonymous when accessing the Internet. It has been around for some time, but for many years was used mainly by experts and enthusiasts. However, Edward Snowden's revelations have resulted in a surge of interest in Tor as more people seek online anonymity.

Thinking About Security: Security by Numbers

Jon Geater | Posted 04.05.2014 | UK Tech
Jon Geater

We all live multiple lives - as private individuals, national citizens, and corporate employees - and all those lives need to develop the same intuitive sense of security in the digital world as we already have in the physical world.

Some Scary Numbers...but Don't Have Nightmares!

David Emm | Posted 15.03.2014 | UK Tech
David Emm

315,000 new samples are analysed every day. Browser-based attacks nearly doubled to 1,700,870,654.Offline attacks (via USB flash-drive, for example) totalled 3 billion, from a total of 1.8 million malicious and potentially unwanted programs.

Encrypting Your Data Is a Good Thing... Unless Someone Else Has Done It

David Emm | Posted 16.02.2014 | UK Tech
David Emm

'Ransomware' Trojans, as the name suggests, are designed to directly extort money from their victims. They may block access to a computer's file system, or encrypt data that's stored on it and then ask for a payment to release the data.

Why You Should Buy Internet Security and a Winter Coat

Lucy Karsten | Posted 29.01.2014 | UK Tech
Lucy Karsten

'You've got a virus,' my little sister said finally, sneering at me in a way that made it perfectly clear that she considered the whole matter beneath her. 'What internet security provider are you using?' I laughed, because internet security software is like ironing, or packing the night before a flight- done only by the neurotic or the elderly.

Strange Virus Might Be Able To Infect PCs Through Their Speakers

Huffington Post UK | Posted 23.01.2014 | UK Tech

A very strange (and worrying) new form of computer virus appears to be able to infect your PC through its speakers. The rootkit virus is apparently...

What Is Malware? (Part two)

Allen Scott | Posted 16.11.2013 | UK Tech
Allen Scott

No piece of software is perfect or can ever be perfect. These imperfections within the code can be exploited by hackers to gain access to your computer. Once an exploit is found, it is patched by the software company which then sends an update to its users. This is the update that you keep ignoring.