Information Security

How to Block Phishing Texts image by Hut Six Security

How to Block Phishing Texts

SMS Phishing Fraud Defence Knowing how to block phishing texts and spam emails is essential for personal information security, as both are as seemingly inevitable as the tides. Coming to us…


Information Security Attacks Threaten the UK Education Sector blog image by Hut Six security

Information Security Attacks Threaten the UK Education Sector

How do Information Security Attacks threaten the UK Education Sector? Over the last several years, the education sector in the UK has seen many of the same issues that face industries across the…


is information stored in the cloud secure

Is Information Stored in the Cloud Secure?

Is information stored in the cloud secure? It’s fair to say that 2019 was the year that cloud computing went mainstream, though despite many businesses willingness to migrate data away from local…


The Biggest Data Breaches of 2019 blog image by Hut Six Security

The Biggest Data Breaches and Hacks of 2019

As a new year begins, it’s time to begin reflecting on what has been observed and what has been learnt. It’s estimated that over 10 billion records have been breached in 2019; comprised of thousands…


Chrome goes for Gold in Password Security blog image by Hut Six Security

Google Chrome Goes for Gold in Password Security

Google Chrome has now introduced a new feature that alerts users if any of their login credentials have been compromised in a data breach and will recommend when a password change is necessary.…


pseudonymisation blog image

What is Pseudonymisation?

Pseudonymised Information and Data Masking Explained The GDPR strongly recommends two principles be adhered to in relation to organisations and their data: anonymisation and pseudonymisation.…


Windows 10 Security Flaw blog image

NSA Discloses Severe Windows 10 Security Flaw

The United States National Security Agency (NSA) has uncovered and exposed an extremely serious security flaw in Microsoft’s Windows 10 CryptoAPI service. Publicly announced by the intelligence…


Wifi safety blog image

Top 5 WiFi Safety Tips: The Guide to Staying Secure

The abundance of WiFi networks available to us is obviously massively useful; whether we’re out shopping, commuting or socialising, people are always looking for ways to stay connected. But the same…


Travelex Ransomware Attack Enters Its Third Week

As the Travelex ransomware attack enters its third week of shutdown, conflicting statements, inconsistencies and general vagaries permeate both news reporting and the company’s public…


malware blog image by Hut Six Security

Malware, Stalkerware – Beware: The Growing Market for Privacy Invading Apps

The threat of malware, spyware and ransomware are all likely familiar to most tech-savvy UK users. With over 78% of UK adults now owning a smartphone, the treasure troves of personal data that these…