Alex James

Windows 10 Security Flaw blog image

NSA Discloses Severe Windows 10 Security Flaw

The United States National Security Agency (NSA) has uncovered and exposed an extremely serious security flaw in Microsoft’s Windows 10 CryptoAPI service. Publicly announced by the intelligence…


Wifi safety blog image

Top 5 WiFi Safety Tips: The Guide to Staying Secure

The abundance of WiFi networks available to us is obviously massively useful; whether we’re out shopping, commuting or socialising, people are always looking for ways to stay connected. But the same…


Travelex Ransomware Attack Enters Its Third Week

As the Travelex ransomware attack enters its third week of shutdown, conflicting statements, inconsistencies and general vagaries permeate both news reporting and the company’s public…


malware blog image by Hut Six Security

Malware, Stalkerware – Beware: The Growing Market for Privacy Invading Apps

The threat of malware, spyware and ransomware are all likely familiar to most tech-savvy UK users. With over 78% of UK adults now owning a smartphone, the treasure troves of personal data that these…


sending simulated phishing attacks to employees

Sending Simulated Phishing Attacks to Employees

As phishing attacks become increasingly sophisticated, users are adapting to this cyber threat. Only seven years ago, the user click rate for phishing emails was a whopping 25%, a figure which has…


Information Security and compliance blog image

Information Security - Is it Just About Compliance?

Across all different industries, there is a significant portion of professionals that, despite assurances otherwise, look at both cyber security and information security as something of a business…


what is the cia triad blog post image

Information Security Principles: What is the CIA Triad?

In 2018, 72% of large businesses and 31% of small businesses identified breaches or attacks. The average cost of these attacks has risen an enormous 27% from the previous year. Though it is perhaps…


suspicious certificates blog image

Suspicious Certificates, Transparency and HTTPS

Will Certification Transparency Help to Rebuild Confidence in Certificate Authorities? With research suggesting an increasing trend towards SSL certified phishing websites (some up to 58%), users…


When the ICO website mined crypto blog image

Information Commissioner’s Office Mining Crypto

When it Comes to Information Security, Pobody’s Nerfect When we think about security and vulnerability, it’s tempting to sometimes believe there is a ‘fix’ to security issues; that with enough…


What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…