Uncategorised

Rise of Automotive Hacking

The rise of automotive hacking is in full force, with many advanced vehicles discovering wireless and other cyber vulnerabilities. This area is becoming a new frontier for car hackers to exploit and learn from. Automotive hacking has been difficult over the past decades because the cars were designed to be protected from the outside by […]

Rise of Automotive Hacking Read More »

The Evolution of phishing: How it is becoming more sophisticated over time

mitigatecyber

The term “phishing” was first used in 1996 to describe a group of hackers impersonating AOL workers on AOL messenger to steal users’ accounts and billing details. As this was a never-seen-before tactic, many naïve users fell for this scam. Even though we’d like to think we’re too tech-savvy to fall for a phishing scam

The Evolution of phishing: How it is becoming more sophisticated over time Read More »

Cyber Essentials 2022 Update

On the 24th January 2022, IASME and the National Cyber Security Centre will introduce an updated set of requirements for the Cyber Essentials certification scheme. The update is the biggest overhaul of the scheme’s technical controls since it was launched in 2014. Over the past two years, the adoption of cloud services has massively increased

Cyber Essentials 2022 Update Read More »

Cyber Security First Aid: The Steps for Business Recovery Following a Cyber Attack

mitigatecyber

As technologies advance and become more integrated into our lives, so do the tactics used by cyber criminals to try and compromise your business. Keeping up to date with the latest cyber criminal activities can be difficult, and ensuring your business has an effective cyber security strategy throughout its operations can also seem like an

Cyber Security First Aid: The Steps for Business Recovery Following a Cyber Attack Read More »

Scroll to Top