‘Pay the ransom – or watch me wreck your life’

‘Pay the ransom – or watch me wreck your life’: Chilling new fraud email that says you’ve been filmed on an adult website The ‘ransom’ email explains that you have been caught viewing an adult website The email includes key private details, such as secret passwords for a bank Criminals are frightening victims into handing […]

Chilling ransom attacks

Chilling ransom attacks threatening to share embarrassing information ‘driving people to suicide’ Victims are told compromising material will be shared unless they cough up huge sums of money Chilling ransom messages being sent to random victims are costing them thousands of pounds and even driving some to the brink of suicide, according to reports. Shocking […]

Quantum Computers are coming.

Prepare now for quantum computers, QKD and post-quantum encryption The predicted processing power of quantum computers is likely to make existing encryption algorithms obsolete. Quantum key distribution (QKD) is a possible solution – we investigate whether QKD is viable Quantum computers have been on the horizon for several years, but recent breakthroughs mean we could […]

Recent Hacks Highlight Need For Intelligence Threat Detection

The recent cyber-attacks on both British Airways and Stena Line highlights the growing need for any entity that stores sensitive information, to install intelligence threat detection software, in order to try to avert hackers before they cause damage. British Airways saw some 380,000 passenger’s card details accessed, while Stena Line had 800 of their staff’s […]

Hackers steal details of 380,000 BA Customers

EXCLUSIVE: As hackers steal details of 380,000 BA customers, we are given unique access to the agents fighting masterminds of financial crime The recent data breach at British Airways saw hackers steal the financial details of 380,000 customers. It is the latest in a maelstrom of cyber attacks that are spreading computer viruses and installing […]

Smart cities and GDPR: What’s next?

GDPR came into force in May this year. Now what? Colin Tankard from Digital Pathways takes a look. So, the General Data Protection Regulation (GDPR) has been introduced and city leaders are happy, knowing their IT people have instigated the right policy statements and that they have adhered to the regulations. But just how happy […]

Knowing What you Have: The Road to Effective Data Discovery

It’s hard to keep data secure when you’re not sure what information you have. While your databases might be neatly ordered and well understood, much of the information washing around in organisations is likely to be in the form unstructured data – emails.PDFs, word processor and spreadsheet files and many other types in a wide […]

Education & Training: The Downfall of File-less Attacks (AVT)

While we are all aware of the file-less or zero-footprint attack, the growth in their use has been alarming. With regular anti-virus tools less likely to detect them, how can the ‘savvy’ CIO ward against them? The answer lies squarely in the need for the education and training of employees, ensuring they fully understand exactly […]