New starter: Jon Coss joins the team as a Cyber Security Engineer!

My interests in technology really began when I got my first PC back when I was six (when the chunky box monitors were top-range!). I used to create user accounts and manage them – acting as a systems administrator. I also stripped and built PC’s and this was where my passion for technology truly sparked. When I was taking my …

AppCheck: Detect Rogue JavaScript Crypto-Miners

Browser based Crypto-Mining malware has made a dramatic resurgence in 2018 hitting the headlines on several occasions over the past month. Most recently, two major campaigns affecting thousands were reported by The Register with those affected ranging from YouTube to the UK’s Information Commissioner’s Office (Ref 1 Ref 2). Trend Micro reports an increase as high as 285% in the …

NEW SECURITY ALERT. Anish Chauhan’s advice on the WPA and WPA 2 vulnerabilities

Yesterday, a security issue involving protocol-level vulnerabilities in WIFI Protected Access (WPA) and WIFI Protected Access II (WPA2) was discovered. What is the vulnerability? These vulnerabilities which are collectively referred to as KRACK attacks (Key Reinstallation Attack), affect both end-user devices that connect to wireless networks (wireless clients) and access points (wireless infrastructure devices). This vulnerability can only be exploited …

Cyber Awareness month: The rise of Ransomware

What is Ransomware? Ransomware is a type of malicious software which takes control of its victims device and encrypts the data making it unobtainable. The cybercriminal then demands a sum of money (often the digital currency bitcoin) in exchange for returning their sensitive data. The first ever recorded ransomware was the Aids Trojan in 1989 and was spread via floppy …

GDPR Article in the Birmingham Business Post!

Take a read of our article featured in the August 2017 addition of the Birmingham Business Post! The piece is the first of three instalments which will focus on different aspects of GDPR. Keep an eye on our website and social media for the next instalment and the dates for our GDPR workshops in Autumn. Follow the link below to …