Posts

Microsoft Security have issued a detailed report on a massive phishing-as-a-service operation named BulletProofLink that offered as a subscription all the tools needed to conduct a campaign. The phishing-as-a-service, or PHaaS, model differs from the phishing kits that many gangs have used in that it is more expansive and handles many of the small details that could befuddle a less tech-savvy attacker.

Businesses, and anyone caught in a bad-tempered divorce, should be on the alert for mercenary hackers for hire. Firms large and small have been victim to keypad for hire gunslingers who possess tech savvy skills to breach the most sophisticated defences.

Our digital activity could increase the number of cyber threats we receive. For example, logging onto Netflix, shopping online or using internet banking. If one of these accounts is hacked, log in information, messages or financial data could be accessed from different accounts across the internet.

Cybersecurity attacks have spiked since the lockdown began. With most of the UK workforce based remotely, an organisation may be more at risk to a cyberattack. With the increase in attacks and decrease in protections in an organisation, data could be at risk. 

How to make sure your IoT devices don’t become tasty bait for data trawlers. Our previous blog where we examined how the net is full of security holes, in this blog we look at possible precautions against data trawlers.

As ways of breaking into casinos go, a fish tank is an unusual route. Yet that is what was used in an unnamed American gambling house in 2017. It had invested in a internet-connected tank in which the temperature and salinity of the water were remotely controlled. 

Most of the population are adjusting to working from home. This may be new for many people and navigating this can be difficult. Tech may be the answer to effectively turn your home office into a productive space.

The Cloud is a network of servers where each has a different function. Serviceteam IT has written a series of blogs surrounding the benefits and uptake of the cloud and in 2017 and 2018’s research reports. However, when you are choosing a cloud security provider, organisations will need to consider the level of data privacy and security at risk.

Do you find yourself constantly reading about cyber-security attacks on individuals and businesses? Often reading regional statistics, national impacts and what individuals can do to prevent an attack? Have you seen the potential effect of a global attack? A coordinated global cyber-security attack could have an economic impact of up to $193bn.