Digital Skimming graphic

Magecart Digital Skimming

Magecart is a hacker group that specialise in digital skimming attacks. Digital skimming is a type of attack where threat actors insert malicious code into the systems on e-commerce websites responsible for handling payment information, with the aim of stealing credit or debit card information. Magecart has been responsible for the data breaches of over[…]

Microsoft logo

Microsoft Safe Links

Safe Links is one of Microsoft Office 365’s Advanced Threat Protection features to protect users from malicious URLs. It works by re-writing URLs received in emails so that, when clicked, you will first be taken to a Microsoft domain where the URL is verified for authenticity, reputation and malicious content. If the link passes the[…]

Pen Test

The purpose of penetration testing

Penetration testing is the method of simulating a real-world cyber-attack on either infrastructure, an application or sometimes even on your staff. This test is strongly advised, even compulsory in some cases, as part of many security-related standards such as PCI-DSS or ISO27001. The main objective of a penetration test is to gain assurance that your[…]

HTTPS

The importance of HTTPS in web applications

Hypertext Transfer Protocol (HTTP) is a fundamental protocol that is used by the World Wide Web for viewing website content on the internet. HTTP allows us to browse the internet and navigate to our favourite websites. HTTP was not initially created with security in mind, and this meant that any information communicated between your computer[…]

Virtual Private Network Graphic

What are Virtual Private Networks and how do they work?

A Virtual private network (VPN) is a piece of software that allows you to access the internet privately, acting as a tunnel between you and your destination, enabling users to send and receive data securely across the internet. Much like having a firewall on your network to protect your computer, a VPN will secure your[…]

Cyber Security Services

What do Cyber Security companies do?

Cyber Security is a very large field with many specialities. With a drastic increase in the number of companies experiencing a data breach or cyber incident, the need for Cyber Security services could not be greater. This article will touch on some of the core services that Cyber Security companies offer, and how they are[…]

Cyber Security

The Evolution of Cyber Security

Cyber Security has not always been a high priority among businesses. However, with the growing threat and proven damage showing among high profile companies and services like TalkTalk, Equifax, Yahoo and even the NHS has shone light on how Cyber Security should be taken very seriously. Businesses, regardless of their size, are now catching on[…]

University Student

Iranian Attack on Universities

A US-based Information Security company, Secureworks, has identified attacks originating from Iran targeting over 300 Universities including those based in the United Kingdom, Australia and the US. The attack on universities was harvesting credentials by posting a fake website that then redirected to a legitimate page. Victims that entered their normal login credentials into the[…]