New Malware knows when You’re Travelling so Hackers can Strike

As reported in IT News, malware that has a very specific purpose has been found lurking in the Google Play store. It’s called Overseer, and it’s designed to target business travellers going overseas. It steals lots of information for a very specific purpose. Once installed on a user’s Android device, Overseer collects and sends home […]

Read More >


Attack Vectors and Attack Surfaces explained

In IT Security, two industry terms deserve a bit of explaining. They are: Attack Vector Attack Surface An “Attack Vector” is the industry’s term for describing the path that a hacker or a malware application might follow to compromise your data. In the case of the Target credit card breach from 2013, the hackers gained […]

Read More >


How do you bring law to the Wild West of the IoT?

Headlines keep saying that the Internet of Things, billions of web-enabled devices that share information via cloud services, is coming. The fact is, it’s already here. From mining companies using thousands of sensors on plant and machinery to refine their maintenance schedules through to the IP camera that your business just installed beside the front […]

Read More >


Here are 8 simple, practical tips for mobile security

Did you know that the average user looks at their mobile device more than 50 times per day? It’s more than you’d think, but if you count the number of times you do it, you’ll see it’s an accurate figure. That’s up from a 2013 Deloitte study that calculated 33 looks per day in 2014 […]

Read More >