Social Engineering

How to Block Phishing Texts image by Hut Six Security

How to Block Phishing Texts

SMS Phishing Fraud Defence Knowing how to block phishing texts and spam emails is essential for personal information security, as both are as seemingly inevitable as the tides. Coming to us…


Information Security Attacks Threaten the UK Education Sector blog image by Hut Six security

Information Security Attacks Threaten the UK Education Sector

How do Information Security Attacks threaten the UK Education Sector? Over the last several years, the education sector in the UK has seen many of the same issues that face industries across the…


malware blog image by Hut Six Security

Malware, Stalkerware – Beware: The Growing Market for Privacy Invading Apps

The threat of malware, spyware and ransomware are all likely familiar to most tech-savvy UK users. With over 78% of UK adults now owning a smartphone, the treasure troves of personal data that these…


sending simulated phishing attacks to employees

Sending Simulated Phishing Attacks to Employees

As phishing attacks become increasingly sophisticated, users are adapting to this cyber threat. Only seven years ago, the user click rate for phishing emails was a whopping 25%, a figure which has…


What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…


How to spot a spear phishing email blog post

Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email

Having covered the rise of spear phishing and how easily criminals can collect information to create targeted attacks, we can now examine the different indicators that can be used to spot a…


spear phishing blog post image

Spear Phishing Series part 1: How a Spear-Phishing Email is Created

Spear-phishing is a much misunderstood topic in the business community. This is the first in a three-part series designed to help you understand how you can reduce your risk of being ‘caught’. These…


Security in your personal life blog image by Hut Six Security

Security in your Personal Life

It’s possible that personal information security is not your first thought when you wake up in the morning. That’s probably a good thing. Though, at a time when we hear plenty about high-profile…


Hut Six Security social engineering image

Micro-businesses are underestimating social engineering

Every day we see headlines dominated by big name corporates falling prey to cyber-attacks yet we rarely hear about Small Enterprise cases where the danger is just as great and the consequences…


Hut Six Security social media blog image

Don’t let your Social Media be an open Book

Posting, sharing, liking and commenting have become a routine in our daily lives, but we must be careful what we are broadcasting and to whom… We share information online assuming that our posts…