Social Engineering

what is a phishing text message blog image

What is a Phishing Text Message?

How to Detect, Report and Block Smishing Attacks Just as you’ve likely received your fair share of scam emails, chances are you’ve also received some suspicious text messages. Every year, an…


The Essential Anti-Phishing guide for SMEs blog image Hut Six Security

The Essential Anti-Phishing Training Guide for SMEs

Information Security Basics When considering the basics of information and cyber security, it’s sometimes tempting to think that we are in the group that are ‘too smart’ to be fooled by anything…


Security is no picnic blog image

SME Security is No Picnic

Problem in Chair Not in Computer There are many issues that organisations can encounter when dealing with information security; from lost files and credential sharing, to protecting intellectual…


what is phishing in computer blog image

What is Phishing? In Computer Technology - It’s a Number 1 Threat

Fundamentals of Information Security Awareness Assuming you have an email account, which in all likelihood you do, it’s basically guaranteed that at some point you’ve received a phishing email.…


what does phishing mean in computer terms blog image

What Does Phishing Mean in Computer Terms?

A Guide to Phishing and Keeping your Information Protected Dear reader, you must click this link ASAP to apply urgent security updates. Sound familiar? Chances are, if you have an email…


How to Block Phishing Texts image by Hut Six Security

How to Block Phishing Texts

SMS Phishing Fraud Defence Knowing how to block phishing texts and spam emails is essential for personal information security, as both are as seemingly inevitable as the tides. Coming to us…


Information Security Attacks Threaten the UK Education Sector blog image by Hut Six security

Information Security Attacks Threaten the UK Education Sector

How do Information Security Attacks threaten the UK Education Sector? Over the last several years, the education sector in the UK has seen many of the same issues that face industries across the…


malware blog image by Hut Six Security

Malware, Stalkerware – Beware: The Growing Market for Privacy Invading Apps

The threat of malware, spyware and ransomware are all likely familiar to most tech-savvy UK users. With over 78% of UK adults now owning a smartphone, the treasure troves of personal data that these…


sending simulated phishing attacks to employees

Sending Simulated Phishing Attacks to Employees

As phishing attacks become increasingly sophisticated, users are adapting to this cyber threat. Only seven years ago, the user click rate for phishing emails was a whopping 25%, a figure which has…


What to do if you've been phished blog image

Spear Phishing Series Part 3: What to do if You’ve Been Phished

In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…