Study Shows No-One Is Immune From Phishing

Study Shows No-One Is Immune From Phishing

A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the…

Read More

Google Changes Stance Over Legacy G Suite Account

Google Change Stance Over Legacy G Suite Account

Google has offered new alternative options to free Legacy G Suite account holders who it had previously said would have to upgrade to a paid subscription by 1 July. What Is A Legacy G Suite Account? Google’s free edition of G Suite, known as Workspace, was first made available to businesses, organisations, and schools from…

Read More

30% Rise In Crypto-Laundering

Cryptocurrency for money laundering

A report by blockchain data platform ‘Chainalysis’ has shown a 30 per cent increase in cryptocurrency being used for money laundering in 2021 compared to the previous year. $8.6 Billion The 2022 Crypto Crime Report noted how cybercriminals laundered a massive $8.6 billion worth of cryptocurrency in 2021. The figure was arrived at by compiling…

Read More

Tech Insight : What Is A ‘Watering Hole’ Attack?

What Is A 'Watering Hole' Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…

Read More

Tech Tip – 3 Helpful Chrome Tricks

3 Helpful Chrome Tricks

Here are 3 tips/tricks for Google Chrome to help with queries and searches that can be typed directly into the address bar (also known as the Onnibox): Find websites that are similar – For example, type related:bbc.co.uk – This will deliver results showing similar (media) websites. – The same type of search can be carried…

Read More

What Is A ‘Watering Hole’ Attack?

What Is A 'Watering Hole' Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…

Read More