By Robert Grigoras (Beware: Spoilers ahead) Introduction The series is set in 2024, The Undeclared War tracks a leading team of analysts buried in the heart of GCHQ, secretly working to ward off a series of cyber-attacks on the UK in the run up to a general election. When a routine stress test of internet […]
By Nick Duley. As technology is becoming an increasing part of our lives. It’s important to protect our privacy and security from online trolls and hackers. Facebook is one of the most common social networks out there and by default, the privacy features for one’s account are very limited. Leaving your personal information open. In […]
By Eve Ferguson Most grandparents are now joining the world of smartphones, social media, internet banking and following the global pandemic, online shopping. So, how do you explain to a trusting generation that some people on the internet are just plain evil? My Nan, who is quite tech savvy – probably more tech savvy than […]
By Mustafa Obousy Employees are proposed to be possibly the weakest link in a business in terms of its’ security system, as they are most liable to hacking schemes – as they are usually targeted through emails and attachments which could potentially bring down the reputation of a business eventually leading to organisation failure. A […]
By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they access our business data? And the question chain continues… Who is Using it? Modern technologies play a crucial role in the challenging IT world, many companies like Netflix and Adobe started using serverless applications. Many […]
By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious link, I decided to dig a little deeper into how to avoid phishing attacks. We are continuously warned not to click on mysterious links in emails and texts, yet it only takes a momentary lapse […]
By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world’s biggest cyber attacks to a multinational consortium of at least 8 criminal organizations. They’re best known as Magecart attacks, also known in the tech landscape as front-end attacks. These hacker groups who attack shopping cart networks online, typically the Magento scheme, […]
By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may believe them to be. As with any system, the main point of vulnerability is often the user; opening the wrong link/attachment, vising the wrong site, and installing suspicious software can open the floodgates for malware. […]
By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying a critical function, any mistreatment or subjugation of her reputation was seen as disrespectful, not just to her but to society as a whole. Yet the same doesn’t seem to be the case a few […]
By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering and possibly much more. A simple definition of a side-channel is something that enables you to find out something about a thing without directly observing that thing. Think of a quiet neighborhood during wintertime. All roofs are covered by snow, except for one. […]
By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life; from the industrial revolution to the events revolving around Y2K. Even with the doubts of the year 2000, and how calendar storage data was going to be affected due to the transition into the new […]
By Diana Ion. It is common knowledge in the security community that it is not a question of “IF a system fails” but more of “WHEN a system fails”. Having 100% coverage against attacks is impossible since your controls can never fail while an attacker needs only one lucky strike to succeed. Always aiming for […]
By Atul Periwal. You might be thinking of how a wallpaper can be a medium of malware? There might be an error but no, a wallpaper on android phone can be used as a medium of malware to crash your android mobile phone. The image above, which can be directly downloaded from Google images, causes […]
By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet. In this pandemic as the figure of infected people is rising due to a virus, simultaneously cybercrime threats are increasing at a rapid rate. It is pointless to mention, there are thousands of examples showing […]
By Chloe Wood. It has been 99 days since Boris Johnson announced to the UK that we will be going into lockdown due to Covid-19. This lockdown saw us swap our offices, to make-shift home set ups. Although lockdown rules are starting to be eased in the UK, (I’m sure we all can’t wait for […]
By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for a streaming site, subscription service, or online store and have been met with the daunting “Choose a Password” screen, with an endless list of criteria to follow to ensure a strong password. But you haven’t […]
By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to aid and facilitate their functions and processes, it becomes necessary for them to test the safety and security of these IT systems. Small and medium-sized enterprises also known as SMEs, are especially vulnerable to cyber […]
Despite being a term on everyone’s lips and an increasing wealth of information becoming available online, cybersecurity remains somewhat of an abstract concept. This may have something to do with its intangibility or perhaps more simply because most us don’t feel the need to gain knowledge of the topic and apply it to our everyday […]
As with any hostage situation, there is no guarantee that by paying the ransom, you will be granted access to your PC; by paying on time, you may be able to access your files again. Missing the deadline could result in the ransom amount increasing or all of your files being deleted or released into the public domain.
The Office for National Statistics estimates that there were 2.46 million cyber incidents and 2.11 million victims of cyber crime in the UK in 2015. There are simple ways to improve the security of your personal data and that of your business, from the mouth of industry and government experts.
By Oliver Yule-Smith Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how we as individuals increasingly embed the use of internet-dependent devices to make our lives easier. However, there is a much more prevalent, but less discussed of late, practice of using this same IoT to run […]
By Aqsa Hussain.. We have all heard about the whistleblowing scandal of 2013 which erupted in the USA resulting in a monumental leak of classified CIA files. Edward Snowden, the former contractor at the NSA and man responsible for this scandal soon after became the ‘coverboy for unpatriotism’ for some and heroism for […]
The changing effect of modern-terrorism and technology, has made surveillance an even more intrinsic aspect of society. Perhaps, greater transparency in the revealing of successful operations would justify their existence e.g. the capture of dark-net paedophiles. However, this is a difficult request as the intelligence community naturally seeks to retain the cloak of secrecy and independence to operate.