When we hear the term ‘Endpoint Security’ we often think of making sure your organization is protected from malicious actors and cyberattacks attacking via an endpoint. This involves making sure that all the access points into an organization’s critical systems and physical devices are protected from unauthorized access to prevent damage to the rest of the network.more →
2018 was a busy year for retail in the cyber security arena, with many organizations suffering from data breaches during the year, including British Airways and Vision Direct.
British Airways suffered a sophisticated data breach affecting around
380,000 customers using its website and mobile app.
The attack –more →
With yet another data breach in the news, and the focus on digital security at the forefront of most people’s minds, I thought it would be a good time to review the history of HTTP, and the role it plays in current (and future) security measures.
A brief history of HTTP, SSL and TLS
It’s a safe bet that when Tim Berners-Lee was working on HTTP in the 1980’s, he couldn’t have anticipated the hand his new protocol would have in creating and shaping the digital world we all know today.
We recently looked at the many types of hackers, but now we take a closer look at which of hacker tends to perpetrate DDoS attacks and why they use this method.
DDoS attacks are one of the oldest types of cyberattacks, but they have still seen a massive growth recently.more →
In the simplest terms hacking generally refers to unauthorised intrusion into a computer or a network. The person (or persons) engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from its original purpose. There is a common misconception that your average hacker is a young person in a hoodie holed up in his parent’s basement.more →
Guess Who? Identity theft?
“Does your person have blue eyes?” “Does your person have massive eyebrows?” “Is your person wearing a hat?” “Is your person Frank?”
I was playing Guess Who? with my youngest son yesterday. Guess Who? is a game I played as a child and I’ve always enjoyed its simplicity.more →
In a 2018 report by McAfee and the Centre for Strategic & International Studies (CSIS), it was found that cyber-crime has a global impact of $600 billion every year on businesses, through everything from losses due to system closures to reputation damage. This has affected many companies, with an attack now being a very real possibility for a lot of organizations.more →
August has seen multiple online gaming sites hit with DDoS attacks, causing tournaments to be halted and players needing reimbursement. Some of these attacks have taken domains offline, lasting for several hours and preventing players from entering the system or playing any games.
DDoS stands for Distributed Denial of Service, meaning that the target site gets flooded with illegitimate requests, which prevents real customers from connecting.more →