Our Blogs

Blog topics
Can’t find what you’re looking for?
Search

It is being widely reported that the leading dating app Tinder has been hacked and that over 70,000 photos have been shared on a cybercrime website – Tinder has not confirmed this. The photos have been shared to a site known for dealing in malicious software. Whilst no one can say for sure what will happen with these photos from Tinder, it is a huge concern that the 16,000 users were all female, with some of the photos being of an expliciet content. There are several theories surrounding what...

Where there’s a will, there’s a way. A saying as old as time and as true now as ever. There are many stories circulating recently about security systems being hacked and Amazon’s Ring security system has topped that list for more than one reason, with charges being filed against them in the US. Ring is Amazon’s flagship system for home security that can be controlled using the internet and via your smartphone . It comprises of cameras, smart locks, and smart doorbells. It has been alleged that...

Cybercriminals are the latest in a line to cash in on Coronavirus themed scams. Scammers are currently targeting people in the most affected countries, purporting to be from WHO (World Health Organisation) or other such medical bodies. They are sending emails containing ‘useful tips’ that can help prevent the virus or halt the spread of it. Within these emails are suspicious links and files designed to deliver viruses onto your computer or device. Others are creating websites in an attempt to...

EasyJet has admitted to being hacked in January 2020 with 9 million customer details being stolen in the cyberattack. What happened? The Luton-based budget airline discovered a ‘highly sophisticated cyber-attack ’ back in January 2020, which affected nine million customers. EasyJet informed customers of the breach once an investigation had been conducted. The investigation was to ascertain whose details had been targeted, what information had been accessed and to identify individuals who were...

Cybercrime is a name used for different types of crime and illegal activities that take place on the internet/online or where technology is involved to target or attack a victim’s computer and network. Cybercriminals range from rogue individuals to organised crime groups and even state-sponsored actors. They are incredibly organised and professional with online fraud and facilitate their activities to maximise their profit in the shortest time. It is one of the fastest growing criminal...

Deepfake is one of the newest internet storms to hit. So, what is it? Most of us by now have seen the face-ageing and face-swapping apps that are available. Smartphone camera apps are becoming increasingly more sophisticated, making these pictures easy to create. The images these apps generate are not overly realistic. Still, there is a technology that can make a person look and/or sound entirely like someone else by swapping faces in videos. “Deepfake” is an amalgamation of “Deep Learning”...

After a year of deliberation, Twitter announced on February 4th, 2020 that it intends to crack down on deepfake videos. This will be implemented before the U.S. presidential campaign later this year, 2020. Deepfake videos are forms of media that have been significantly and deceptively altered from the original videos, by using artificial intelligence. The altered media can make it appear that something else is being said or even that someone else is saying it. In May 2019, Nancy Pelosi...

“He thought of the telescreen with its never-sleeping ear. They could spy upon you night and day..” George Orwell, 1984. The sentiments of George Orwell have never been more accurate than of late. Social media is part of the very fabric of our existence. With so many social media platforms, such as Facebook, Twitter, Instagram, TikTok, Google+, LinkedIn, and Snapchat, the majority of us document our lives daily. Yet how many of us are fully mindful of what we post and the audience that views...

The Government has recently announced it is cracking down on weak default passwords, such as 1,2,3,4. Most IoT devices (Internet of Things) devices come with a default password to help make the setting up of such gadgets quick and simple. This could be 1,2,3,4 or 0,0,0,0,- weak passwords. These devices generally have an option to change the password, but how many of us do? In a world where we have so much to remember, we forget to change it, or we choose just to leave it as it is- nice and...