IT & Security News
Study Shows No-One Is Immune From Phishing
A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the…
Google Changes Stance Over Legacy G Suite Account
Google has offered new alternative options to free Legacy G Suite account holders who it had previously said would have to upgrade to a paid subscription by 1 July. What Is A Legacy G Suite Account? Google’s free edition of G Suite, known as Workspace, was first made available to businesses, organisations, and schools from…
30% Rise In Crypto-Laundering
A report by blockchain data platform ‘Chainalysis’ has shown a 30 per cent increase in cryptocurrency being used for money laundering in 2021 compared to the previous year. $8.6 Billion The 2022 Crypto Crime Report noted how cybercriminals laundered a massive $8.6 billion worth of cryptocurrency in 2021. The figure was arrived at by compiling…
Tech News : UK Government ‘Help to Grow’ Scheme : Software And Free Business Advice
The UK government has just announced the launch of its ‘Help to Grow’ digital scheme which offers discounted software and free advice to small businesses. Applications Open Now The Help to Grow scheme is designed to support smaller businesses in adopting digital technologies to help them to grow. Applications for the scheme opened on 20…
Tech News : Google Gives Upgrade Deadline For Legacy G Suite Accounts
Google has announced in an email that users with legacy (old) free G Suite accounts have until 1 July to upgrade to paid subscriptions or lose access to most services. Ten Years Free Google has said that legacy G Suite users i.e., those who have been able to use their custom domain accounts for free…
Tech Insight : What Is A ‘Watering Hole’ Attack?
In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…
Featured Article: How To Stop Your Emails From Ending Up In Spam Filters
In this article, we look at how spam filers work and what can be done to ensure that our legitimate emails reach their target and aren’t wrongly filtered out as ‘spam’ . Why We Need Spam Filters Although we’re focusing on how to avoid spam filters, it’s worth noting how important they are to businesses.…
Security Stop Press : Backdoors Discovered In Dozens Of WordPress Themes And Plugins
It has been reported that 40 themes and 53 plugins belonging to AccessPress Themes, a Nepal-based company were backdoored with malicious code in the first half of September 2021. It is believed that the infected extensions gave attackers full access to sites, and that access also appears to have been sold to operators of spam…
Tech Tip – 3 Helpful Chrome Tricks
Here are 3 tips/tricks for Google Chrome to help with queries and searches that can be typed directly into the address bar (also known as the Onnibox): Find websites that are similar – For example, type related:bbc.co.uk – This will deliver results showing similar (media) websites. – The same type of search can be carried…
What Is A ‘Watering Hole’ Attack?
In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…
[grid_plus name="Tech News"]