blue with white text certificate transparency blog image

Suspicious Certificates, Transparency and HTTPS

We are increasingly at risk of malware, phishing and "watering hole" attacks.

ICO Cryptojacking blog image

Information Commissioner’s Office Mining Crypto

Even those who administer guidelines are susceptible.

What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

If you suspect you've been phished, stay calm and follow these steps.

confirmation of payee blog image

Will Confirmation of Payee Reduce APP Scams?

COP will make banking safer, but will it go far enough?

How to spot a spear phishing email blog post

Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email

Follow these steps to identify suspicious emails.

Surveillance economy blog post image

Human Rights and the Growing Surveillance Economy

How this new field of data-driven commerce is increasingly impacting human rights.

HP firmware issue blog post image

Attention: HP’s Self-Destructing Firmware

HP has announced a firmware issue that could affect thousands of enterprise users.

How is a spear-phishing email created blog post image

Spear Phishing Series part 1: How a Spear-Phishing Email is Created

The first in a three part series exploring spear-phishing and how to avoid being caught.

information security vs cyvber security blog post image

Information Security vs Cyber Security: What’s the Difference?

Contrary to popular belief, these are not interchangeable terms.

Facebook ICO fine blog image

The Cost of Poor Information Security

Facebook agrees to pay, yet still makes no admission of liability in relation to its violations of the Data Protection Act 1998.

cyber security awareness month blog image by Hut Six Security

Cyber security Awareness Month: Once a year, all year.

The month to reinforce the importance of cyber security to employees is every month.