Making Your Router Secure

With your router in charge of all incoming and outgoing Internet traffic and controlling the Wi-Fi network for your devices, it makes sense to make it as secure as possible. Routers Your router is the device that connects your computer and other devices to a network and, via a service provider, to the Internet.  A […]

Continue reading


AI, Data Protection & The ICO

The Information Commissioner’s Office (ICO) has published guidelines to help clarify how data protection principles apply to AI projects. The Document The guidance document (now a pdf available online on the ICO website) was produced by an associate professor in the Department of Computer Science at the University of Oxford and is aimed at those […]

Continue reading


Free Cyber Security Testing Module For Remote Workers

A new penetration testing module as part of the National Cyber Security Centre’s Exercise in a Box toolkit will help remote workers of SME’s to improve their cybersecurity. What Is ‘Exercise In A Box’ ? ‘Exercise in a Box’ is an online tool from the NCSC which helps organisations find out how resilient they are […]

Continue reading


NatWest’s Extra Layer of Behavioural Biometrics Security

In partnership with Visa, NatWest has added an invisible layer of behavioural biometrics as part of an authentication process that will enable compliance with a new EU regulation. Which Regulation? The Strong Customer Authentication (SCA) regulation, which is part of the EU’s Payment Services Directive 2 (PSD2) comes into force in 2021. The SCA regulation is intended to […]

Continue reading


Beware Fake Contact Tracer Messages

Just as you thought that cybercriminals had exploited every aspect of the pandemic with phishing, vishing, smishing and more, there are now warnings to beware of fake contact tracer messages. Contact Tracing in the UK Here in the UK, NHS contact tracers are now contacting those persons who are believed to have been in close contact […]

Continue reading


eBay Port Scanning Causes Alarm

Reports that eBay has been running port scans against the computers of visitors to the platform have caused alarm over potential security issues. Port Scans Port scanning is something that many people associate with cyber-attacks and penetration (‘pen’) testing.  Port scanning scripts are used to determine which ports a system may be listening via, by sending […]

Continue reading


‘Vishing’ and How to Guard Against It

‘Vishing’, or ‘phishing over the phone’ is on the rise and in this article, we look at vishing techniques and examples, and how to prevent them. Vishing The word Vishing is a combination of ‘voice’ and ‘phishing’ and describes the criminal process of using internet telephone service (VoIP) calls to deceive victims into divulging personal […]

Continue reading


Does Your Phone Have A Virus?

Phones are essentially powerful mobile computers that contain vast amounts of valuable personal information. This article looks at how to tell if your phone has a virus, what to do if you think it has, and how to protect your phone. Virus or Malware Both a virus and malware are malicious programs, but in security […]

Continue reading


Google Blocks 18 Million Coronavirus Scam Emails Per Day

Google is reported to have been blocking 100 million phishing emails per day and 18 million email scams relating specifically to coronavirus. Millions of Scams and Spam Messages Daily On its Cloud blog on 16th April, Google reported that Gmail blocks more than 100 million phishing emails each day and over the previous week, it had blocked […]

Continue reading


Research Indicates Zoom Is Being Targeted By Cybercriminals

With many people working from home due to coronavirus, research by Check Point indicates that cyber-criminals may be targeting the video conferencing app ‘Zoom’. Domains Cybersecurity company ‘Check Point’ reports witnessing a major increase in new domain registrations in the last few weeks where the domain name includes the word ‘Zoom’.  According to a recent […]

Continue reading