Phishing for a bite

Please note that the steps provided in this walkthrough were performed using a secured operating system.  I got up this morning, was having coffee and catching up on things when I was surprised to see that my bank had sent me a text to tell me know that my online...

read more

What would you do if you saw…

...something that looked like this: This type of message had landed in a handful of staff at a company that had called us for help. Unfortunately for the individuals that clicked on one of the links, their woes were just about to start. The above "phishing" message...

read more

What’s in a password?

Almost every day you are likely to hear some mention of Cyber Crime, whether this is through fraud or websites being compromised. The clear message is that there is now a lot of data that appears to be getting stolen. Some of that data could be extremely...

read more

Not all wireless is secure

Privacy and security issues never seem to be out of the news - whether it be high profile data breaches, or our personal information being shared with organisations. Home automation being used by criminals or private CCTV footage being publicly broadcast. Wireless in...

read more

A history of Cloud Computing

A History Of Cloud Computing The history of cloud computing starts way back in the 1960’s, when an ‘intergalactic computer network’ was first suggested, and in recent years the technology has served to shake up both enterprise IT and supplier landscape. Over the...

read more