The Rise Of The No-Frills Hacker

Nicholas Shaw | Posted 04.08.2017 | UK Tech
Nicholas Shaw

It looks innocent enough - a receipt from your favourite high street shop, a file to review from a colleague or an alert from your bank or gas company that you have a statement to review or bill to pay. But something rather more sinister could be sitting in your inbox, waiting to be clicked.

Received A Text Message From Your Bank Recently? A New Scam Is Tricking People Into Emptying Their Accounts

The Huffington Post | Thomas Tamblyn | Posted 12.04.2017 | UK Tech

Received a text from your bank recently? A new ‘smishing’ scam is convincing people to hand over their bank details by sending text messages disgu...

Why Phishing Is Only The Beginning Of A Cyber Attack

John Worrall | Posted 19.12.2016 | UK Tech
John Worrall

Of course it is always better to keep an attacker outside of your network if you can. But, recognising the difficulty of that, many companies today operate as if a breach has already (or will) occurred.

How To Protect Yourself From The Other Insider Threat

John Worrall | Posted 02.11.2016 | UK Tech
John Worrall

Honest insiders also are targeted by malicious outsiders through using social engineering. E-mail phishing (and spear-phishing to target high-value individuals) is one of the most common types of social engineering, but examples range from simple phone calls to carefully crafted Web sites hosting malicious content.

Social Engineering: Securing Workers In The Digital Age

Robert Arandjelovic | Posted 18.10.2016 | UK Tech
Robert Arandjelovic

Modern-day fraudsters use every trick in the book when it comes to infiltrating a network. They are well prepared, well researched, and highly innovative. One of the most common tactics used to glean valuable information is social engineering, using techniques such as phishing or collecting data from social media.

They Finally Arrested A Nigerian Man Responsible For Email Scams

The Huffington Post UK | Ryan Barrell | Posted 22.05.2015 | UK

A Nigerian man behind a million-dollar phishing scam has been sentenced to 36 months in prison, the FBI has announced. The scam used fraudulent ema...

Is That Ad Safe to Click? Why The Answer Is Almost Always Yes (And How to Shop Safe Online)

Greg Cristal | Posted 25.04.2015 | UK Tech
Greg Cristal

Those of us addicted to online shopping don't think twice about responding to ads that appeal to us. But if you want to eliminate all doubt about which ads you should click, here's all you need to do.

Twitter Is Tricking Its Employees Into Clicking On Spam

The Huffington Post UK | Thomas Tamblyn | Posted 13.02.2015 | UK Tech

Following the Sony Pictures Hack, Xbox hack and others, large tech companies are now using slightly unorthodox methods to clue their employees up on t...

'Vishing' Is Insanely Profitable. So What Is It?

Press Association | Posted 02.12.2014 | UK Tech

A drive to combat phone scammers has been launched after new figures showed a sharp rise in the amount of money lost to such fraud last year. Finan...

'Vishing' Is Insanely Profitable. So What Is It?

PA | Posted 02.12.2014 | UK Tech

A drive to combat phone scammers has been launched after new figures showed a sharp rise in the amount of money lost to such fraud last year. Finan...

Five Ways to Protect Yourself Against Online Identity Theft

Anthony Smith | Posted 24.12.2014 | UK Tech
Anthony Smith

Barely a week goes by without at least one news story about a new online scam. It seems the criminals are always one step ahead, and will try anything to catch out the unwary.

How to Handle a Nigerian E-mail Scammer

Stephen Hamilton | Posted 03.11.2014 | UK Comedy
Stephen Hamilton

We've all had them, we've all read them, and some have actually been stupid enough to reply to them. I am of course talking about the famous, "Dear sir, I am the son of an African diplomat...blah, blah, blah, E-mail.

Revenge of the Gummi Finger - Pointing at the Wrong Target

Jon Geater | Posted 17.06.2014 | UK Tech
Jon Geater

I'll leave it to biometrics companies to defend fingerprints in general (there are arguments on grounds of reliability, cost etc that carry some weight) and save my own opinions on biometrics as credentials for another day.

EA Phishing Attack Dupes iTunes Users To Input Passwords

Huffington Post UK | Posted 20.03.2014 | UK Tech

An official EA Games server has been attacked by hackers -- and now hosts an incredibly realistic "phishing" site to try and collect user names and pa...

No Business Too Small to be at Threat From Cybercriminals

David Emm | Posted 14.05.2014 | UK Tech
David Emm

Due to the lack of awareness of these threats, the often overlooked human element and the limited security measures that may be in place, it's becoming easier for cybercriminals to target small, local businesses.

Cyber Criminal From Manchester Jailed Over £1.5m Phishing Scam

The Huffington Post/PA | Posted 25.01.2014 | UK

A man has been jailed for nearly four years for his part in a phishing scam that targeted UK students to steal in excess of £1.5 million. Olajide ...

Criminals Applying For Fake Student Loans, Costing Taxpayers £6.5m

The Huffington Post UK | Posted 06.08.2013 | UK Universities & Education

Criminals are targeting the UK's student loans company by submitting fake applications, which has cost taxpayers more than £6.5m this financial year ...

Down at the Watering-Hole

David Emm | Posted 07.09.2013 | UK Tech
David Emm

Drive-by downloads are a common method used to spread malware. Cybercriminals look for insecure web sites and plant a malicious script into HTTP or PHP code on one of the web pages. This script may install malware directly onto the computer of someone who visits the site, or it may take the form of an IFRAME that re-directs the victim to a site controlled by the cybercriminals.

Fraudsters Most Likely to Serve Us 'Phish' on Fridays

Ian Emery | Posted 03.09.2013 | UK Tech
Ian Emery

If you think about it Friday's the perfect day to try a scam, especially in the afternoons when the week's work is either done or shelved till Monday. This is when workers are most likely to find time to share images and videos with friends and colleagues.

Lax Consumer Habits Online Are on Collision Course With Business Security

Mike Foreman | Posted 27.08.2013 | UK Tech
Mike Foreman

the rapid rise in smartphones and tablets has led to a work phenomenon commonly referred to as BYOD (Bring Your Own Device). Coupled with Cloud-based business services, this has been a real game changer. So blurred have the boundaries now become that the more cavalier Internet habits of relatives and friends of every staff member have the potential to set the consumer and business world on a collision course.

Demystifying Rocra

David Emm | Posted 26.03.2013 | UK Tech
David Emm

If you have stumbled across the phrase 'Red October' in the past few weeks, you may think it sounds like an operation from a John le Carré novel. In ...

Internet Governance: Preserve Freedom, Ensure Development!

Paulo Casaca | Posted 12.12.2012 | UK Politics
Paulo Casaca

The internet has been a tremendously effective tool for freedom and development, but that could now unravel should proposals tabled for WCIT come to fruition.

Are You Too Friendly With Facebook?

The Huffington Post UK | Lucy Sherriff | Posted 18.09.2012 | UK Universities & Education

Students who add strangers on Facebook are being warned of the dangers of online fraud as a new survey shows many share confidential information on th...

Six Arrested Over £1m Phishing Scam

PA | Posted 09.12.2011 | UK

Six people have been arrested in connection with a £1 million phishing scam that drained the bank accounts of hundreds of UK students, Scotland Yard ...