Botnet network taken down, destructive critical infrastructure attacks up

safety internet hackerThere’s always something going on in the cyber world but the past week has been particularly noteworthy, ranging from businesses fighting back with a useful scam tracker to worrying findings suggesting that destructive attacks on critical infrastructure organisations are actually far more frequent than you would think.

Read more


Hi-tech Movie Myths

hack.movieTraffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.

Read more


Ugly Mail – Gmail extension to identify e-mail tracking pixels

email With spyware and adware already tracking our movements across the web who needs another form of intrusive monitoring? It seems like some people can’t get enough of tracking others and emails that tell the senders whether you’ve opened an email and where you were if you did are becoming more common. However, help is at hand. Ugly Mail is the simplest of tools and it lets you know if an email that has dropped into your inbox is designed to track you.

Read more


Malware exploit kits

cybercrimeMalware exploit kits are believed to account for most malware infections today. These kits are rented out to hackers, spammers and phishers so they can out their nefarious activities. Find out all you need to know about malware exploit kits from where they originate to how to protect yourself.

Read more


Ten years of phishing

phishingIn 2004 phishing was officially recognized as a global, industrial-scale problem. Since then it has become even more entrenched with scammers all over the world, from the Ukraine and India, to the US and Belgium, adopting it. But today, it is also mutating into spear phishing, precise attacks aimed at specific and lucrative targets.

Read more


The Phablet Phenomenon

The Phablet PhenomenonThe Western World is rapidly moving towards mobile computing; it’s fast, easy and powerful and in most cases can enable the same, and higher, levels of computing as desktop PCs and laptops. As a result, phablets, a hybrid smartphone and tablet are becoming increasingly popular with analysts predicting that their growth will eventually outstrip that of tablets and traditional smartphones. They are serious devices, but they also need serious protection.

Read more


Another bitcoin exchange hacked

bitcoinBitstamp, a trusted bitcoin exchange, has been hacked to the tune of over £3 million. ‘Don’t worry,’ says the company, it’s only a fraction of what it holds in its reserves. It’s also the latest in a long line of bitcoin hacks.

Another bitcoin exchange has been hacked with the theft of about £3.4 million in virtual currency. This time it was Bitstamp, one of the largest and most trusted of bitcoin exchanges.

Read more


North Korea and the US on common ground

ExploitYou’ve probably heard of zero-day exploits but might not know what exactly it means. It’s a type of virus that is extremely dangerous, and relatively common. Traditional antivirus detection doesn’t halt zero-day exploits however, they can be stopped. And intriguingly, governments around the world from North Korea to the US pay a lot of money for information on zero-day discoveries – so they can turn them against others.

Read more