What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

If you suspect you've been phished, stay calm and follow these steps.


confirmation of payee blog image

Will Confirmation of Payee Reduce APP Scams?

COP will make banking safer, but will it go far enough?


How to spot a spear phishing email blog post

Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email

Follow these steps to identify suspicious emails.


Surveillance economy blog post image

Human Rights and the Growing Surveillance Economy

How this new field of data-driven commerce is increasingly impacting human rights.


HP's destructing firmware blog image

Attention: HP’s Self-Destructing Firmware

HP has announced a firmware issue that could affect thousands of enterprise users.


spear phishing blog post image

Spear Phishing Series part 1: How a Spear-Phishing Email is Created

The first in a three part series exploring spear-phishing and how to avoid being caught.


information security vs cyvber security blog post image

Information Security vs Cyber Security: What’s the Difference?

Contrary to popular belief, these are not interchangeable terms.


information security cost blog image by Hut Six Security

The Cost of Poor Information Security

Facebook agrees to pay, yet still makes no admission of liability in relation to its violations of the Data Protection Act 1998.


cyber security awareness month blog image by Hut Six Security

Cyber security Awareness Month: Once a year, all year.

The month to reinforce the importance of cyber security to employees is every month.


Security in your personal life blog image by Hut Six Security

Security in your Personal Life

It’s possible that information security is not your first thought when you wake up ...


Hut Six Security blog image new branching tutorial feature

New from Hut Six: Scenario-based branching Tutorials

New tutorials that reinforce training and build security awareness