020 7193 4905

Cybersecurity

Phishing for Passwords

Phishing for Passwords

Recently, a friend received an email message addressed to his private company’s email address, telling him that a number of his mail messages had...

Emotet – Malware as a Service

Emotet – Malware as a Service

One of the most virulent carriers of malware is on the loose – again The popular image of computer hackers is one of pimply geeky nerds sitting in...

SIMjacking

SIMjacking

Two-factor authentication (TFA) is now a standard part of our online life. We log onto a service, or initiate an online transaction, and just to...

What’s up, WhatsApp?

What’s up, WhatsApp?

Messaging service can act as gateway to turn phones into bugging devices Although this popular messaging service, owned and operated by Facebook, is...

You can take it with you!

You can take it with you!

Clients of Canada’s largest crypto currency exchange, QuadrigaCX, found themselves locked out of most of the £145 million worth of their assets. The...

Keep the Wooden Horse where it belongs

Keep the Wooden Horse where it belongs

Troy, 1200BCE (give or take a year). The Greeks have left their camp outside the walls, and in their place is a large wooden horse. Ignoring the...