General Election in the UK

Posted in News | Comments Off on General Election in the UK

Meet the founders of Echosec — Entrepreneurs | Startups | Small Business Owners

  Echosec is a location based social media platform, tell us about the team behind it.Echosec was started in Victoria, Canada by Karl Swannie in late 2013. Built of the side of his desk while working at his GIS company, Karl quickly realized that the core technology of Echosec was capable of a different direction and scale than his current business. While looking for investment, he was introduced to the Owen Matthews, son of Sir Terry Matthews, and the Alacrity Foundation. From this introduction, Karl secured venture capital financing and was introduced to what would become the rest of the founding team – three engineering master’s students – Jason Jubinville, Michael Anderson, and Nicholas Turner.After scaling out for spring and summer of 2014, Echosec made its first hire in December of 2014. Through introductions made by the Alacrity foundation, Echosec hired a Welsh team to work on sales and marketing efforts for the UK and the EU. Under Managing Director Ben Milsom’s influence, Echosec UK would grow to be an integral part of the Echosec teamSince then, Echosec has grown to a team of 17 people across the two offices with clients from around the world. With so many social media platforms around, why did you see the need for another? When we started our platform, most ‘competitors’ were in the brand management space and provided outbound messaging services. Most solutions focused on only one or two social media platforms. These platforms would use account engagement, or keyword and sentiment analysis to conduct and measure the success of marketing campaigns.Echosec was always a data first platform, we didn’t want to stop at just Twitter or Instagram, we wanted to get every feed that we could. We also wanted to focus on location relevance instead of keyword or username analysis. We saw a space in the market for that. So tell us about how Echosec actually works from a user perspective. The basic workflow for an Echosec search is: 1. Pick a location of interest anywhere in the world 2. Draw a search boundary directly on the map using our browser based interface 3. Filter and analyse the social media results directly in the application 4. Compile summary statistics and setup up alerts or notifications On the back end, how did you pull the entire concept together? Well, no backend infrastructure is dreamt-up and implemented in a single night. The development team has been working at improving on our design since Echosec’s inception in 2014. The backend architecture team has a wealth of experience in scalable infrastructure and cloud deployments from both academicia and the private sector. This experience allows us to tackle one scalability hurdle at a time while still managing the massive amount of information that passes through our system every minute. Social media has become so important for sharing news and information, how useful has it been as a marketing tool for Echosec?Especially during the early days, social media marketing was very important to our success. Echosec is in a unique position where our customers are actively using/searching social media when they might encounter our marketing materials. We can point to any number of occasions where clients were carrying out their day-to-day work, stumbled across our content and thought, “wow, that definitely solves the problem I am having right now.” What have you found to be the most useful social media platform to market your business? Twitter. Twitter is by far the most business-oriented platform. It is also where many of our clients go to first when they are looking to engage with consumers or to invest in social media discovery. While it was, and remains to be, the best resource to market our solution on social media, we don’t necessarily expect it to remain that way. The social media landscape is always changing and it’s our job to stay ahead of the curve.  What advice would you give to young entrepreneurs who want to get into the tech industry?There are probably too many to list, but here are a few: All you need is a laptop and an internet connection. You don’t need to know how to code. You don’t need to have a wealth of business savvy. Sure, it helps. But really, it doesn’t take any of that to validate a business idea and get going. You can learn the rest along the way.If you are no longer embarrassed about a part of your platform, you have shipped too late. The idea is to get your MVP to market as fast as possible and iterate on it based on real customer feedback. Every new product will have bugs and require new features here and there, better to get that feedback today than six months after you invested in the wrong direction.And network. In the early days of your business, people are buying into you just as much as they are buying into your product idea or business. Organisations and events that allow you to expand that network and get out there are invaluable – Innovation Point, Tech Dragons, and Cardiff Start to name a few.

Source: Meet the founders of Echosec — Entrepreneurs | Startups | Small Business Owners

Posted in Friends | Comments Off on Meet the founders of Echosec — Entrepreneurs | Startups | Small Business Owners

Amazon refuses to give police Echo voice data in murder case

Despite a search warrant, Amazon won’t hand over the audio records transmitted through an Echo device that belongs to a man charged with murder.

Source: Amazon refuses to give police Echo voice data in murder case – Business Insider

Posted in Internet of Things | Comments Off on Amazon refuses to give police Echo voice data in murder case

Uber wants to know where you go – after you leave its cars

Uber raises privacy concerns with location tracking update

Source: Uber wants to know where you go – after you leave its cars | IT PRO

Posted in Internet of Things | Comments Off on Uber wants to know where you go – after you leave its cars

Instagram’s Launching New Tools and Control Features Ahead of the New Year

Instagram is set to launch four new features to end 2016.

Source: Instagram’s Launching New Tools and Control Features Ahead of the New Year

Posted in Social | Comments Off on Instagram’s Launching New Tools and Control Features Ahead of the New Year

Turning point as social media tackles online ‘terror’

Source: Turning point as social media tackles online ‘terror’ | Daily Mail Online

Posted in Social | Comments Off on Turning point as social media tackles online ‘terror’

PHA Fraud Forum 2016 – Speakers | Private Healthcare Australia

Source: PHA Fraud Forum 2016 – Speakers | Private Healthcare Australia

Mr Tony Bennett, Investigative Researcher & Head of Training, Qwarie Ltd

Tony Bennett

Tony has over 26 years’ experience as an investigator and intelligence operative within the UK police service. A subject matter expert in Intelligence Gathering, Open Source Investigation, The Internet, Cyber Crime, Digital Forensics and Investigation Skills.

Tony holds an Masters Degree in Computer Forensics and has spent several years in charge of a Police Cyber Forensics team in the UK police service.

During the end of and after his police service Tony has also taught many hundreds of investigators, mostly from law enforcement but also from local authorities and insurance companies, as well as private investigators and journalists, in the art of using the Internet as an Investigative Tool. These courses have mostly been in the UK but have also been given in a number of different countries around the World.

In 2016 Tony joined Qwarie (www.qwarie.com) as their head of training to build on what he was doing previously but in a bigger company to offer OSINT research and training to more clients around the world.

Further details: http://www.privatehealthcareaustralia.org.au/fraud2016/speakers/

 

Posted in News | Comments Off on PHA Fraud Forum 2016 – Speakers | Private Healthcare Australia

macOS Sierra release date, price, features and latest news: macOS Sierra upgrade expected tonight

OS X successor could make its debut at Apple’s “Special Event”

Source: macOS Sierra release date, price, features and latest news: macOS Sierra upgrade expected tonight | IT PRO

Posted in Tech | Comments Off on macOS Sierra release date, price, features and latest news: macOS Sierra upgrade expected tonight

Raspberry Pi have now sold 10m of their £4 computers which are made in Wales

Up to 20,000 computers a day are now pumped out of the Pencoed factory

Source: Raspberry Pi have now sold 10m of their £4 computers which are made in Wales – Wales Online

Posted in Tech | Comments Off on Raspberry Pi have now sold 10m of their £4 computers which are made in Wales

Is the future of cyber crime a nightmare scenario?

Chances are cyber crime is going to get worse before things get better as new technology develops and the hacker hunters fight back

Source: Is the future of cyber crime a nightmare scenario? – Raconteur

Posted in News, Viruses and Scams | Comments Off on Is the future of cyber crime a nightmare scenario?

Why Social Media Sites Are The New Cyber Weapons Of Choice

Social 1

Facebook, LinkedIn, and Twitter can’t secure their own environments, let alone yours. It’s time to sharpen your security acumen.

Source: Why Social Media Sites Are The New Cyber Weapons Of Choice

Posted in News, Social, Viruses and Scams | Comments Off on Why Social Media Sites Are The New Cyber Weapons Of Choice

Windows 10 collects an ‘unprecedented amount’ of data, claims EFF

Microsoft-EFF-Windows-10-Electronic-Frontier-Foundation-Windows-10-Privacy-Concerns-Privacy-Report-Windows-10-Privacy-EFF-Upgrad-702982

WINDOWS 10 has been criticised for its overly aggressive upgrade tactics, privacy concerns and lack of user choice, in a damning new report by the Electronic Frontier Foundation.

Source: Windows 10 collects an ‘unprecedented amount’ of data, claims EFF

 

Posted in Tech | Comments Off on Windows 10 collects an ‘unprecedented amount’ of data, claims EFF

The Internet’s 25th birthday sparks celebrations online

14F66052000005DC-3755011-image-a-71_1471969703190

Internet users believe the anniversary marks a quarter of a century since the web’s inventor, Sir Tim Berners-Lee, made the service publicly available for the first time on 23 August 1991.

Source: The Internet’s 25th birthday sparks celebrations online

Posted in News, Tech | Comments Off on The Internet’s 25th birthday sparks celebrations online

iPhone users plagued by sinister Netflix email scam? Here’s how to protect yourself

iphone

Users of Apple’s iPhone are being targeted by a new iTunes email scam demanding payment for a phoney Netflix subscription. Here’s how to protect yourself.

Source: iPhone users plagued by sinister Netflix email scam? Here’s how to protect yourself

Posted in Mobile Phone Tech, Viruses and Scams | Comments Off on iPhone users plagued by sinister Netflix email scam? Here’s how to protect yourself

Net overload ‘sparks digital detox for millions of Britons’

People sitting together and looking at their phones

More than half of people in the UK feel hooked by digital devices, leading many to take days, weeks or even months away from their screens, says a study.

Source: Net overload ‘sparks digital detox for millions of Britons’ – BBC News

Posted in Social | Comments Off on Net overload ‘sparks digital detox for millions of Britons’

Nearly six million fraud and cyber crimes last year

Laptop

Almost six million fraud and cyber crimes were committed last year in England and Wales, new figures from the Office for National Statistics suggest.

Source: Nearly six million fraud and cyber crimes last year, ONS says – BBC News

Posted in Viruses and Scams | Comments Off on Nearly six million fraud and cyber crimes last year

Hacker claims 200m Yahoo accounts are listed on a dark web market

A cybercriminal known as ‘Peace’ has listed the credentials for 200 million alleged Yahoo accounts for sale on the dark web. The massive set is being sold for just 3 bitcoins, roughly $1,860

A cybercriminal has listed credentials for 200 million alleged Yahoo accounts for sale on the dark web. Yahoo has neither confirmed nor denied the claims, and users may want to reset passwords.

Source: Hacker claims 200m Yahoo accounts are listed on a dark web market | Daily Mail Online

Posted in Dark Web, Viruses and Scams | Comments Off on Hacker claims 200m Yahoo accounts are listed on a dark web market

Ransomware has left almost 10 per cent of UK firms ‘unable to operate’

Ransomware note on laptop

Malwarebytes reveals 54 per cent of British businesses have been affected

Source: Ransomware has left almost 10 per cent of UK firms ‘unable to operate’ | TheINQUIRER

Posted in Viruses and Scams | Comments Off on Ransomware has left almost 10 per cent of UK firms ‘unable to operate’

Unencrypted wireless keyboards wide open to keystroke logging

KeySniffer tool enables hackers to sniff out passwords and other sensitive information

Source: Unencrypted wireless keyboards wide open to keystroke logging | TheINQUIRER

Posted in Viruses and Scams | Comments Off on Unencrypted wireless keyboards wide open to keystroke logging

Stop Trespassing and Avoid Mobs from PokemonGo

Security, trespassing and Pokemon Go.   PokemonGo has without a doubt, captured the minds of the world. http://www.pokemongo.com/ The virtual reality application has skyrocketed to chart-topping levels in both the

Source: Stop Trespassing and Avoid Mobs from PokemonGo | Echosec

Posted in Social | Comments Off on Stop Trespassing and Avoid Mobs from PokemonGo

Ransomware demand doubles in half a year

Ransomware demand doubles in half a year

Symantec tells us that the average ransom demand is now £525, up from £223 at the end of last year.

Source: Ransomware demand doubles in half a year | ITProPortal.com

Posted in Viruses and Scams | Comments Off on Ransomware demand doubles in half a year

How to get a verified blue tick on your Twitter account in the UK

Those with an account which has a ‘public interest’ are more likely to be approved

Source: How to get a verified blue tick on your Twitter account in the UK | WIRED UK

Posted in Social | Comments Off on How to get a verified blue tick on your Twitter account in the UK

Why you DO need antivirus software for your Mac (probably)

Do Macs get viruses? And do Macs need an antivirus? Mac OS X is inherently secure, but after various flaws and attacks in recent years – including the SSL bug/Gotofail error – Mac users are understandably concerned. Here are a handful of steps you can take to tighten up your Mac’s security

Source: Why you DO need antivirus software for your Mac (probably)

Posted in Viruses and Scams | Comments Off on Why you DO need antivirus software for your Mac (probably)

UK firms failing on cyber security

All companies are now vulnerable to cyber attacks, even those with a low public profile in industries not generally associated with cyber crime.

Source: UK firms failing on cyber security

UK firms failing on cyber security

Posted in News | Comments Off on UK firms failing on cyber security

WhatsApp scam targets users with virus to steal their details

Source: WhatsApp scam targets users with virus to steal their details

Posted in Viruses and Scams | Comments Off on WhatsApp scam targets users with virus to steal their details

How to stop nuisance calls with one simple text message

MOBILE phone users can send a text message to opt out of nuisance calls from today.

Source: How to stop nuisance calls with one simple text message

How to stop nuisance calls with one simple text message

Posted in Mobile Phone Tech | Comments Off on How to stop nuisance calls with one simple text message

DoS attacks now a cover for something more sinister

Police are taking DDoS attacks seriously, as they are being used as a front to cover bigger assaults.

Source: Denial-of-service attacks now a cover for something more sinister | ZDNet

ddosattack.jpg

Posted in News | Comments Off on DoS attacks now a cover for something more sinister

Whatsapp adds end-to-end encryption

Facebook-owned messaging app Whatsapp heightens security for information sent through the service.

Source: Whatsapp adds end-to-end encryption – BBC News

Whatsapp logo

Posted in Contact Us, Social | Comments Off on Whatsapp adds end-to-end encryption

Cyber-criminals becoming increasingly professional

Report finds that criminals reaching same level of sophistication as nation state hackers

Source: Cyber-criminals becoming increasingly professional

Our images of cyber-criminals need updating

Posted in News | Comments Off on Cyber-criminals becoming increasingly professional

Heavy Use of Social Media Linked to Depression in Young Adults

Source: Heavy Use of Social Media Linked to Depression in Young Adults

Heavy Use of Social Media Linked to Depression in Young Adults

Posted in Social | Comments Off on Heavy Use of Social Media Linked to Depression in Young Adults

Why parents need a social media policy for babysitters

If you have a sitter, nanny or caregiver, have you shared your rules for posting photos of your children to social media? Here’s why it’s important.

Source: Why parents need a social media policy for babysitters

Why parents need a social media policy for caregivers, and how to get started | coolmomtech.com

Posted in Social | Comments Off on Why parents need a social media policy for babysitters

Israeli firm helping FBI to open encrypted iPhone

Israel’s Cellebrite, a provider of mobile forensic software, is helping the U.S. Federal Bureau of Investigation’s attempt to unlock an iPhone used by one of the San Bernardino, California shooters, the Yedioth Ahronoth newspaper reported on Wednesday.

Source: Israeli firm helping FBI to open encrypted iPhone

Posted in Mobile Phone Tech | Comments Off on Israeli firm helping FBI to open encrypted iPhone

IT for Charities: A Guide – Cheeky Munkey

Read this guide on IT support for charities for answers from our experts to real-world IT problems

Source: IT for Charities: A Guide – Cheeky Munkey

Noname

Posted in Friends | Comments Off on IT for Charities: A Guide – Cheeky Munkey

UK Government Security Classification Scheme

After nearly two years of planning, the new UK Government Security Classification system comes into operation this month. This will probably be accompanied by some articles from the doomsday brigad…

Source: UK Government Security Classification Scheme

Noname

Posted in News | Comments Off on UK Government Security Classification Scheme

Alternative means of settling with bitcoin

Bitcoin has recently experienced another “stress test,” in form of a lot of transaction spam. Along with the continuous debate on whether or not to increase the Bitcoin block size, a lot of people have started looking at the potential outcomes of the situation.

Source: Alternative means of settling with bitcoin » Brave New Coin

Posted in Dark Web | Comments Off on Alternative means of settling with bitcoin

How you will buy your house in 2025: drones, virtual reality and big data

Source: How you will buy your house in 2025: drones, virtual reality and big data

Mark Zuckerburg in a room full of people experiencing virtual reality

Posted in Tech | Comments Off on How you will buy your house in 2025: drones, virtual reality and big data

Is this the future of Social Media?

Mark Zuckerberg made a $2 billion bet on a virtual-reality headset called the Oculus Rift, brainchild of 22-year-old Palmer Luckey, who sold his Kickstarter-funded breakthrough to Facebook this spring. With the Rift about to hit the market, and the competition heating up, Max Chafkin reports on what lies ahead.

Source: Why Facebook’s $2 Billion Bet on Oculus Rift Might One Day Connect Everyone on Earth

Posted in Social | Comments Off on Is this the future of Social Media?

Contactless card owners warned against public transport scanner hack

Source: Contactless card owners warned against public transport scanner hack

contactless

Posted in Tech | Comments Off on Contactless card owners warned against public transport scanner hack

Beware the Android virus, Mazar, that can WIPE your phone

The malware is thought to being used by Russian cybercriminals to gain access to Android devices, allowing them to take control of mobile phones, read text messages, make calls and wipe the devices.

Source: Beware the Android virus, Mazar, that can WIPE your phone

Malware that is being spread by text message allows cybercriminals to take control of mobile devices running Google's Android operating systems. It allows them to read text messages, make calls, eaves drop on internet use and even wipe phones entirely. A stock image of an Android mobile phone is pictured

Posted in Contact Us | Comments Off on Beware the Android virus, Mazar, that can WIPE your phone

February Patch Tuesday plugs holes in Adobe Flash & Office

With 22 security bulletins thus far, Microsoft is on target to surpass 2015’s record of 135 bulletins.

Source: February Patch Tuesday plugs holes in Adobe Flash & Office

Posted in Tech | Comments Off on February Patch Tuesday plugs holes in Adobe Flash & Office

iPhone’s Error 53: Apple is scolding us like an angry parent

The most furious critique of Apple that I’ve seen in the past few days came in the form of an analogy: what if your bank detected fraud on your account, disabled your debit card and then permanently emptied your account to protect you against fraudulent use of that money? It would be monumentally unfair – but that’s how many people have been reacting to the dreaded iPhone “Error 53” that has received so much publicity in recent days.

Source: iPhone’s Error 53: Apple is scolding us like an angry parent

Posted in Mobile Phone Tech | Comments Off on iPhone’s Error 53: Apple is scolding us like an angry parent

Apple’s software update ‘Error 53’ could kill your iPhone 6

If a mysterious error code called ‘Error 53’ pops up on your iPhone, brace yourself. This message could mean imminent death for iPhones that have been repaired by third party services.

Source: Apple’s software update ‘Error 53’ could kill your iPhone 6 or 6 Plus

If a mysterious error code called ‘Error 53’ pops up on your iPhone, brace yourself. This message has been occurring on iPhones since the emergence of iOS 9 updates, and for devices that have undergone third-party repairs, it could mean imminent death

Posted in Mobile Phone Tech | Comments Off on Apple’s software update ‘Error 53’ could kill your iPhone 6

The definitive list of what everyone likes on Facebook

Source: The definitive list of what everyone likes on Facebook

Noname

 

 

Posted in Contact Us | Comments Off on The definitive list of what everyone likes on Facebook

Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Ever

It’s beautiful, it’s addictive, and now Pinterest is having its glorious hockey stick moment. TechCrunch has attained exclusive data from comScore showing Pinterest just hit 11.7…

Source: Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Ever

Posted in Social | Comments Off on Pinterest Hits 10 Million U.S. Monthly Uniques Faster Than Any Standalone Site Ever

British Transport Police: An Illustrated History

Buy The British Transport Police: An Illustrated History by Richard Stacpoole-Ryding. A great read.

Source: The British Transport Police: An Illustrated History

 

Posted in Friends | Comments Off on British Transport Police: An Illustrated History

Tracking the Hooligans: The History of Football Violence on the UK Rail Network

Buy Tracking the Hooligans: The History of Football Violence on the UK Rail Network by Michael Layton, Alan Pacey a great read.

Source: Tracking the Hooligans: The History of Football Violence on the UK Rail Network: Amazon.co.uk: Michael Layton, Alan Pacey: 9781445651804: Books

Posted in Friends | Comments Off on Tracking the Hooligans: The History of Football Violence on the UK Rail Network

Welcome to the divergence

Source: Welcome to the divergence

digital hub

Posted in Internet of Things | Comments Off on Welcome to the divergence

“Internet of Things” security is hilariously broken and getting worse

Shodan search engine is only the latest reminder of why we need to fix IoT security.

Source: “Internet of Things” security is hilariously broken and getting worse

Posted in Internet of Things | Comments Off on “Internet of Things” security is hilariously broken and getting worse

Smartphone Security Guidance

You likely use it multiple times a day, but is it safe and secure? From apps to email to accessing your bank online, here are some of the best ways to secu

Source: Smartphone Security Guidance

Smartphone Security Guidance

Posted in Mobile Phone Tech | Comments Off on Smartphone Security Guidance

How Facebook’s news feed algorithm works.

Source: How Facebook’s news feed algorithm works.

Facebook algorithm

Posted in Social | Comments Off on How Facebook’s news feed algorithm works.

Is it safe to browse the dark web?

Source: Is it safe to browse the dark web?

Posted in Dark Web | Comments Off on Is it safe to browse the dark web?

These are the 25 internet passwords you must not use

Internet security software firm SplashData has released its annual list of passwords of the worst and most common passwords that you absolutely must not

Source: These are the 25 internet passwords you must not use

password

 

 

Posted in News | Comments Off on These are the 25 internet passwords you must not use

Goodbye apps, hello smart agents: Are you ready for the post-app world?

Recent research shows that apps are on the wane

Source: Goodbye apps, hello smart agents: Are you ready for the post-app world?: A world without apps? | TechRadar

Talking to the TV You soon will be

Posted in Mobile Phone Tech | Comments Off on Goodbye apps, hello smart agents: Are you ready for the post-app world?

Facebook will finally launch its social network for using at work

The service is almost ready to be made available to businesses – but will block people from playing Candy Crush

Source: Facebook will finally launch its social network for using at work – Telegraph

LinkedIn has launched new apps for iOS and Android this quarter

Posted in Social | Comments Off on Facebook will finally launch its social network for using at work

The terrorist in the data | The Economist

The terrorist in the data

Source: The terrorist in the data | The Economist

Posted in News | Comments Off on The terrorist in the data | The Economist

Internet Explorer – Move on if you have not already done so!

Source: Internet Explorer End of Support

Posted in News | Comments Off on Internet Explorer – Move on if you have not already done so!

What is VK and Why Should You Care? | Echosec

Vkontakte is ranked second globally for social networks, so how come you’ve never heard of it?

Source: What is VK and Why Should You Care? | Echosec

VK

Posted in Social | Comments Off on What is VK and Why Should You Care? | Echosec

New spying powers will be used to bring online trolls to justice

Theresa May says new surveillance powers – unveiled under the Investigatory Powers Bill last month – will help police and spooks to track down and identify anonymous cyberbullies

Source: Theresa May says new spying powers will be used to bring online trolls to justice

cyberbully1

Posted in News | Comments Off on New spying powers will be used to bring online trolls to justice

Escape your search engine Filter Bubble!

Source: Escape your search engine Filter Bubble!

Noname

Posted in Tech | Comments Off on Escape your search engine Filter Bubble!

Cybercrime tipping point

Download our survey on the evolving threats of cybercrime. Crimes like car theft are declining, cybercrime is rising – how should the UK law enforcement should respond?

Source: Cybercrime tipping point

Cybercrime-Tipping-Point-Header-Image-314x285px

Posted in News | Comments Off on Cybercrime tipping point

VTech Hacked: 6.4 Million Children Exposed

Digital learning toys always make a great holiday gift for children. Unfortunately for one company, VTech Holdings, Ltd., this season may not prove to be so successful after a security hack exposed millions of peoples’ information, including that of children. VTech, a digital learning toy-maker based in Hong Kong, claimed that the information of approximately […]

Source: VTech Hacked: 6.4 Million Children Exposed

ipad-907577_1920

Posted in Internet of Things | Comments Off on VTech Hacked: 6.4 Million Children Exposed

UK Gov will double cybersecurity funding to fend off ISIS cyber attacks

Chancellor also announced support for cyber start-ups and skills development

Source: UK Gov will double cybersecurity funding to fend off ISIS cyber attacks

index

Posted in News | Comments Off on UK Gov will double cybersecurity funding to fend off ISIS cyber attacks

Cyber crime attacks set to hit record levels at Christmas

A DIGITAL security company has warned that 2015 is likely to become the biggest “Cybercriminal Christmas” so far, and it has told UK retailers that they need to be prepared for an increased level of attacks.

Source: Cyber crime attacks set to hit record levels

It is thought Black Friday will be UK’s first £1bn shopping day

Posted in News | Comments Off on Cyber crime attacks set to hit record levels at Christmas

The second most common crime in the UK – Cybercrime

Source: The second most common crime in the UK Cybercrime

Noname

Posted in News | Comments Off on The second most common crime in the UK – Cybercrime

Cybercrime rampant against the elderly

Cyber crime is “rampant” in Ireland, with gardai investigating up to 30 businesses targeted by offshore hackers and 100 cases of mostly older people who were tricked into disc

Source: Cyber crime ‘rampant against the elderly’

HACKERS: Cyber fraud is usually carried out offshore

Posted in News | Comments Off on Cybercrime rampant against the elderly

30 Years of Microsoft Windows

As Microsoft Windows turns 30, we take a look back at the history of the iconic operating system

Source: 30 moments to make you feel nostalgic about Microsoft Windows

ms-windows-logo

Posted in Tech | Comments Off on 30 Years of Microsoft Windows

The Google app now understands you a little better

Source: The Google app now understands you a little better—complex questions welcome

Noname

Posted in Tech | Comments Off on The Google app now understands you a little better

Facebook Safety Check

Giving people the power to share when it matters most.

Source: Introducing Safety Check | Facebook Newsroom

safetycheckmobielcarousel

Posted in Social | Comments Off on Facebook Safety Check

MI5 and GCHQ: Britain facing 70 advanced cyber attacks per month

The UK’s MI5 and the Government Communications Headquarters (GCHQ) have revealed that according to their information-gathering activities, Britain faces around 70 sophisticated cyber-espionage operations per month against its government and industry networks.

Source: MI5 and GCHQ: Britain facing 70 advanced cyber attacks per month

index

Posted in News | Comments Off on MI5 and GCHQ: Britain facing 70 advanced cyber attacks per month

Police Forces ‘Need To Do More’ To Tackle UK Cybercrime

TechUK report calls for technology industry and police to work closer together to tackle cybercrime

Source: Police Forces ‘Need To Do More’ To Tackle UK Cybercrime

police

Posted in News | Comments Off on Police Forces ‘Need To Do More’ To Tackle UK Cybercrime

20 percent of UK cyber-crime victims feel fraudsters target them

One in five victims of cybercrime in the UK think that they were definitely targeted by fraudsters.

Source: 20 percent of UK cyber-crime victims feel fraudsters target them – SC Magazine UK

According to the tenth annual Get Safe Online Week survey, one in five victims of cyber-crime in the UK think that they were definitely targeted by fraudsters.

Posted in News | Comments Off on 20 percent of UK cyber-crime victims feel fraudsters target them

Cybercrime Is Now Britain’s Most Common Criminal Offence

Inclusion of more than seven million cyber offences pushes British crime rate up 70 percent, ONS figures reveal

Source: Cybercrime Is Now Britain’s Most Common Criminal Offence

Cyber crime, hacker, thief © Brian A Jackson, Shutterstock 2014

Posted in News | Comments Off on Cybercrime Is Now Britain’s Most Common Criminal Offence

How secure is your smartphone?

From infected apps to tricky work device policies, mobile security is a prevalent issue, but individuals and businesses can take steps to protect their data

Source: How secure is your smartphone? | Media Network | The Guardian

A man using a smartphone

Posted in Mobile Phone Tech | Comments Off on How secure is your smartphone?

The Essential 5 Step Guide to Secure Your Instagram Account

Follow these 5 easy steps to increase your online privacy and protect your Instagram account from cyber-criminals.

Source: The Essential 5 Step Guide to Secure Your Instagram Account

Essential Instagram Security Guide

Posted in Tech | Comments Off on The Essential 5 Step Guide to Secure Your Instagram Account

How Intelligence Agencies are Using Social Media

Source: Echosec | How Intelligence Agencies are Using Social Media

Today Online Article photo

Posted in Social | Comments Off on How Intelligence Agencies are Using Social Media

Surfacing The News From The Deep Web

All the inside News From the Dark Net Markets – Silk Road Drugs, Hidden Marketplace list, Memes And Harm Reduction Watch

Source: DeepDotWeb – Surfacing The News From The Deep Web

Possible Large-Scale DDOS Attacks on TOR Exit Nodes

Posted in Dark Web | Comments Off on Surfacing The News From The Deep Web

I Liked Everything I Saw on Facebook

I like everything. Or at least I did, for 48 hours. Literally everything Facebook sent my way, I liked—even if I hated it.

Source: I Liked Everything I Saw on Facebook for Two Days. Here’s What It Did to Me | WIRED

Noname

Posted in Social | Comments Off on I Liked Everything I Saw on Facebook

Google agrees to change its privacy policy after being investigated by UK watchdog

Google agrees to change its privacy policy after being investigated by UK watchdog

Google agrees to change its privacy policy after being investigated by UK watchdog

Posted in News | Comments Off on Google agrees to change its privacy policy after being investigated by UK watchdog

British army sets up social media ‘brigade’

British army sets up social media ‘brigade’

Posted in News | Comments Off on British army sets up social media ‘brigade’

Tor’s most visited hidden sites

BBC News – Tor’s most visited hidden sites host child abuse images.

Posted in Dark Web | Comments Off on Tor’s most visited hidden sites

UK’s first mobile phone user

Michael Harrison

via BBC News – UK’s first mobile phone user remembers his call 30 years on.

Posted in Mobile Phone Tech | Comments Off on UK’s first mobile phone user

Instagram overtakes Twitter with 300 million users

Instagram overtakes Twitter with 300 million users

Posted in Social | Comments Off on Instagram overtakes Twitter with 300 million users

Sir Tim Berners-Lee: World wide web needs bill of rights

Sir Tim Berners-Lee: World wide web needs bill of rights.

Posted in News, Tech | Comments Off on Sir Tim Berners-Lee: World wide web needs bill of rights

BBC WebWise

Man holding his head looking anxiously

Security Tips from the BBC……

BBC WebWise

Posted in News | Comments Off on BBC WebWise

Protect your teens: 7 apps and websites parents should be aware of

Protect your teens: 7 apps and websites parents should be aware of | Naked Security.

Posted in News | Comments Off on Protect your teens: 7 apps and websites parents should be aware of

Why Facebook is beating the FBI at facial recognition

Why Facebook is beating the FBI at facial recognition | The Verge.

Posted in Social | Comments Off on Why Facebook is beating the FBI at facial recognition

UK heads Europol’s Joint Cybercrime Action Taskforce

UK heads Europol’s Joint Cybercrime Action Taskforce (Wired UK).

Posted in News | Comments Off on UK heads Europol’s Joint Cybercrime Action Taskforce

Bitcoin virtual fortune of £4m thrown away

James Howells throws out Bitcoin virtual fortune of £4m – discarded to Docksway landfill site, Newport, Wales | Metro News.

Man accidentally throws away £4m Bitcoin fortune

Posted in News | Comments Off on Bitcoin virtual fortune of £4m thrown away

LEARN THE NET: Advanced Web Searching

Learn the net

Great website for learning the basics of the internet

LEARN THE NET: Advanced Web Searching.

Posted in Tech | Comments Off on LEARN THE NET: Advanced Web Searching

May – June 2017: 4 Day OSINT course in London | Qwarie.com

Source: May – June 2017: 4 Day OSINT course in London | Qwarie.com

Posted in Courses | Comments Off on May – June 2017: 4 Day OSINT course in London | Qwarie.com

Blippar wants your face in its app – BBC News

Blippar’s object recognition app adds the ability to identify people’s faces and display information abut them.

Source: Blippar wants your face in its app – BBC News

Posted in Social | Comments Off on Blippar wants your face in its app – BBC News

Remove “Windows Internet WatchDog” virus (Easy Removal Guide)

Windows Internet WatchDog is a new threat from the FakeVimes malware family. This Windows Internet WatchDog threat is classified as virus because it inflicts and acts as a malicious virus into your…

Source: Remove “Windows Internet WatchDog” virus (Easy Removal Guide)

Posted in Viruses and Scams | Comments Off on Remove “Windows Internet WatchDog” virus (Easy Removal Guide)