How To Tell If You’re Being Spoofed

Many cybers attacks now take the form of using fake/spoof communication to trick victims into parting with personal (or company) data, or money. We take a look at some of the most popular and widely reported methods and how to avoid falling victim to them. Phishing This is a very common form of spoofing attack.…

Read More

30 Countries Pledge To Act On Ransomware

The international Counter-Ransomware members from 30 countries have issued a joint statement outlining their intent to take action to counter the growing threat posed by ransomware. What Is Ransomware? Ransomware is a form of malware that encrypts the important files on a computer and the user (often a business/organisation) is given a ransom demand, the…

Read More

Monetising Movement (Your Geo-Data)

In this feature, we take a look at how a multi-billion-dollar market obtains, uses, and sells our location data. Report A GVR report estimates that the global location intelligence market was worth USD 12.2 billion in 2020. This market uses our phone/device location data. There are many different interlinked players in this market ecosystem from…

Read More

Proposed Ban For Mass Facial Recognition & ‘Predictive’ Policing

The European Parliament has adopted a resolution calling for a ban on the use of AI-based predictive policing systems and the processing of biometric data that leads to mass surveillance. Areas The resolution seeks to ban the use of facial recognition technology and AI in several key areas: – Police use of facial recognition technology…

Read More

QR Codes … A Security Risk?

In this tech-insight, we take a look at what QR codes are used for, review some well-known security risks, and outline what action you can take to protect yourself from malicious QR codes. Quick Response (QR) Codes A QR code is a machine-readable (e.g., by smartphones), matrix barcode invented in 1994 by the Japanese Toyota…

Read More

Domain Security

After a recent report found that poor domain security has left most Global 2000 companies vulnerable to the threats of phishing and brand abuse, we take a closer look at domain security and how businesses can maximise their protection against popular threats. CSC Research – Domains Dangerously Under-Protected Recent research by US-based CSC, which describes…

Read More

Legal Tech Advances

In this article, we take a brief look at the many different ways that technology is increasingly being used by legal professionals and by those seeking legal services, and how advancement such as AI are making a valuable contribution. DoNotPay DoNotPay (https://donotpay.com/), described as “the world’s first robot lawyer”, is an app/chatbot program that helps users…

Read More

Tech Insight: What Is Zero Trust?

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article takes a brief look at what a ‘Zero Trust’ approach is and how it can help. More Complex Security Demands The belief among many IT security experts is that a traditional perimeter-based security…

Read More

Green Marketing

Green marketing is a term which refers to a particular marketing strategy, process or set of practices that promotes environmentally friendly or sustainable products and services. Green marketing typically focuses on reducing the marketing department’s impact by using methods that minimize the use of resources like cardboard, plastic and paper while promoting environmentally sound practices…

Read More

Computer Says “Guilty”

An error in the HM Courts and Tribunals Service computer system meant that 5,000+ defendants were wrongly assigned guilty pleas. Accidental Criminal Convictions The problem that led to 5,000+ people being wrongly given criminal convictions was an error in the computer system’s bulk amendment facility, which was used to update the cases of magistrates’ hearings…

Read More