Filter by:

The NSA guide on how to hack

It’s not every day the United States National Security Agency (NSA) leads you through a step-by-step guide on how to hack. When they talk about these kinds of things, it’s important to listen – if they are sharing, the knowledge isn’t secret, and hackers are likely running the playbook with equal proficiency. At a recent

What will General Data Protection Regulation (GDPR) mean for European businesses?

We ended 2015 with full consensus that the internet needs improved security and data protection. Hackers breached too much data from government and corporate entities, and their momentum seemed almost completely uninhibited. We were concerned about the ethics of political and corporate surveillance and noted large holes in how customer, consumer and general population data

Buttoning down privacy and security measures in 2016 – Wearables and the IoT

Remember as a kid watching all of those apocalyptic sci-fi flicks where hackers held countries hostage with single keyboard strokes, smart devices took on minds of their own and sinister robots ran amuck? We haven’t quite hit Space Odyssey levels yet, but new tech has reached awe inspiring levels of both intelligence and connectivity that

Who calls you?

Have you ever been called by someone purporting to be from your bank? Probably, the answer is yes. I once had an ongoing row with my bank as I refused to believe that calls were genuine and hung up each time, or ignored the calls once I recognised the number. But they kept coming. It

Talk to us +44 207 785 8888