With the continued use of mobile devices for both personal and business use, the entire world is looking at mobile accessibility as the vehicle to...
Blog
CaseNotes – An Interview with John Douglas
Read a recent interview with our Technical Director, John Douglas. Creator of the investigative note taking software CaseNotes, find out about his...
Mission Impossible
"Your mission, Jim, should you decide to accept it, is to come up with a response to these demands within twelve hours." What would you do if all...
Incident Response 101
It'll be all right on the night – NOT When a disaster such as a ransomware attack strikes your organisation, how well are you prepared? A cyber...
Remote working has brought problems
These are not theoretical possibilities, but real-life attacks which can cost an enterprise tens of thousands of pounds – or more [Cue Mission...
Secure DNS Lookup
Even asking for directions can lead to trouble... How do you find your way on the Internet? Or rather, how does your computer find its way? When you...
The evidence shows that…
How digital forensic science can be used to make a watertight legal case At a time when a laptop has been supposedly been left behind at a repair...
It can’t happen to us
Unfortunately, it can happen, even to the most secure of us. The recent breach at FireEye, one of the world’s largest and most sophisticated...
Cyberwarfare as an Olympic event
Russia is revealed as the prime actor in attacks on the 2018 Winter Games It has recently been revealed that Russian cyberwarriors targeted the 2018...