Category: Security

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

1 In 10 Fooled By Social Engineering Attacks

A new report by security firm Positive Technologies shows that 1 in 10 employees would fall for a social engineering attack. What Is A Social Engineering Attack? Social engineering cyber-attacks rely upon the element of human error e.g. convincing / fooling a person into downloading malicious files, unwittingly corresponding with cyber-criminals, sharing contact information about…
Read more

Killer Bot Boycott

Reports that the state-run university-based ‘Korea Advanced Institute of Science and Technology’ (KAIST) has been working on military robot research with defence company Hanwa have resulted in threats of a boycott by more than 50 AI researchers from 30 countries. Killer Robots? Although the threat of the boycott of KAIST appears to have been effective…
Read more

Wearable Tech Could Help Solve Murder

Police in Australia are reported to be using data recorded by a murder victim’s Apple smartwatch to help catch her killer. Murder The victim and owner of the smartwatch was Grandmother Myrna Nilsson, who was found dead in the laundry of her Valley View home in Adelaide’s north-east in September 2016. The prime suspect in…
Read more

Robots Not Coming For Your Job Just Yet, Says Report

positive picture, and forecasts of the effects of automation on jobs are not as bad as in the original reports. For example, OECD figures suggest that only 12% rather than 35% of jobs are actually at high risk of being automated in the next 20 years Why The Difference? The OECD report forecasts a lesser…
Read more

UK Universities Are Cryptojacking Targets

The latest attacker behaviour industry report by automated threat management firm Vectra shows that UK higher education institutions are now prime targets for illicit cryptocurrency mining, also known as ‘cryptojacking’. Cryptocurrency Mining ‘Cryptocurrency mining’ involves installing ‘mining script’ code such as Coin Hive into multiple web pages without the knowledge of the web page visitor…
Read more

£870 Million Super-Cyber-Crook Captured

The suspected leader of the criminal gang behind the Cobalt and Carbanak malware campaigns that targeted banks and netted £870 Million has been arrested in Spain. The Carbanak & Cobalt Malware Attacks Cobalt and Carbanak are names of the different generations of malware, increasing in sophistication – 3 were used in all – which the…
Read more

Facebook Revamps Privacy Settings

In a move that Facebook says was due to happen before the recent personal data harvesting scandal, the social media giant has updated its privacy tools to make users more informed and in control. 50 Million Profiles Harvested The high-profile outcry that followed revelations over data from 50 million profiles that were harvested for use…
Read more

Your Computer Data Stored … On DNA?

British scientists believe they have developed a technique that will enable them to store computer files in DNA code. Why? Data storage takes up a huge amount of space. It is estimated that there is now 3 zettabytes (3000 billion billion bytes) of digital data, with more being generated all the time. Also, storage media…
Read more

50 Million Facebook User’s Data With Cambridge Analytica

Facebook is at the heart of a storm after a whistleblower alleged that the data analytics firm that worked with Donald Trump’s election team and the winning Brexit campaign harvested 50 million Facebook profiles from a data breach. Why? London-based data analytics company, Cambridge Analytica, which was once headed by Trump’s key adviser Steve Bannon,…
Read more

Camelot Hack – ‘It Could be You!’

Lottery operator Camelot has announced that 150 customer accounts have been affected by a hack that took place prior to Friday’s £14-million draw at 8.30pm. Low Level The company has described the hack as ‘low level’ and has stressed that no money was stolen, and that the attackers only saw limited information. Camelot attributed the…
Read more