Blog

Blog

Are you looking at me? Welcome to the world of facial recognition

As new technologies develop, it's worth reminding ourselves that just because we can do something doesn't mean that we should. Often a new technology can bring plenty of new opportunities to do amazing things, but that doesn't mean that it cannot also be ripe for abuse. That's certainly the case with facial recognition technology, where some law...
Blog

Security Risks to Consider When Deploying Containers on Docker

Docker – a platform for OS-level virtualization instances known as containers – has become a hugely popular infrastructure technology. Flexible containerization is completely changing the way we build and maintain applications at scale, with analyst group RedMonk identifying the large enterprise market as a key driving force. Towards the end of...
Blog

Last month's malware outbreak cost this household company £100 million

Reckitt Benckiser, the household goods manufacturer of such famous products as Nurofen painkillers, Durex condoms, Dettol, and Harpic, has warned that it was hit hard by the June 27th global malware outbreak which struck power plants, airports, and government agencies in Ukraine before spreading to other multinational firms. In a sales warning for...
Blog

8tracks Hacked: 18 Million User Account Details Stolen

There's bad news for internet music fans, as it has been revealed that the details of millions of users of the 8tracks internet radio service and music social network have been stolen by hackers. In a message posted on its corporate blog, 8tracks confirms it has suffered a security breach: "We received credible reports today that a copy of our user...
Blog

How a Single Email Stole $1.9 Million from Southern Oregon University

Southern Oregon University has announced that it is the latest organization to fall victim to a business email compromise (BEC) attack after fraudsters tricked the educational establishment into transferring money into a bank account under their control. According to media reports, the university fell for the scam in late April when it wired $1.9...
Blog

What the hacking of Gordon Ramsay’s email teaches us all

It doesn't matter if you're a regular computer user, the chairman of Hillary Clinton's presidential campaign , or a notoriously short-fused celebrity chef, we all need to harden the defences of our email accounts. Tabloid readers should know that all too well, having seen plenty of stories over the years of intimate photos stolen from Hollywood...
Blog

How to Get Away with Hacking the Department of Homeland Security

Many businesses live in fear of having their systems hacked. After all, who wants their customers' data to spill out onto the internet or have their confidential plans and intellectual property stolen by online criminals? But more and more organizations like Google, Facebook, and Amazon are actually welcoming attempts to test their security in the...
Blog

Zomato Hacked! Database of 17 Million Users Stolen

Restaurant search website Zomato has announced that it has suffered a major security breach, resulting in the theft of a user database containing 17 million users' names, email addresses and passwords. The news comes as it is reported that a hacker calling themselves "nclay" is claiming to offer the database for sale on the dark web. ...
Blog

Persirai IoT botnet threatens to hijack over 120,000 IP cameras

Internet-connected cameras around the world are once again being hijacked by malicious hackers in order to carry out distributed denial-of-service (DDoS) attacks. Security researchers at Trend Micro have identified that over 1,000 different models of Internet Protocol (IP) cameras are at risk of being compromised by the threat dubbed Persirai, which...
Blog

How to Build a Secure Wordpress Environment

In Part 1 of this series, we covered how easy it is for any novice to set up a self-hosted WordPress site and how quickly security can fall between the cracks. In this blog post, I will share with you what to look for in a Webhost provider, how to secure and harden WordPress, and what often-overlooked items you should watch out for during this...
Blog

ISP Brought Down by Warring Malware Families

A battle between two rival families of malware is being blamed for the downtime that a Californian ISP suffered earlier this month. As BleepingComputer reports, customers of Sierra Tel unexpectedly found themselves without telephone and internet connectivity on April 10. In a statement issued by the ISP the following day, the blame was put firmly on...
Blog

Google is building an ad-blocker into Google Chrome, report claims

When the world's biggest online advertising platform is reported to be working on a technology to block ads in the world's most popular browser, it's no wonder that some eyebrows will be raised. According to a report in the Wall Street Journal, Google is planning to build an ad blocker into Google Chrome. The feature, which would be turned on by...
Blog

Managing Cyber Risk in Schools and Educational Institutions

With analyst group Gartner valuing the annual global spending on educational technology at over £17 billion ($21 billion USD) in 2015, there's no doubt that technology implementation is shaping the future of education systems. The appropriate integration of technology guides students, teachers, and administrators towards clarity and extensibility....
Blog

Five Scams That Won't Make You Laugh on April Fool's Day

If there's one day of the year when everyone has their guard up, it's April Fool's Day. After all, who can put their hand up and say that they have never been duped by an April Fool's trick? Some of the classic April Fool's stunts have gone down in history, such as the BBC's news report from 1957 showing the annual spaghetti harvest in Switzerland....