Skip to main content

Blog

15th September 2025

Bankrupt: how cyber attacks can devastate businesses (part 1)

With some attacks, there is no coming back.Most cyber attacks are bad, but not fatal. Hackers may extort some money through ransomware, or leak some user information, but most…

11th September 2025

Hollywood hackers: what media gets right

Hack the planet! We look at how film and tv can sometimes convey the true threat of cyber crime.This time, we take a look at some of the things that pop culture versions of cyber…

9th September 2025

Hollywood hackers: what media gets wrong

From the guy-in-the-chair cliché to villains using viruses that may as well be magic, film and television gets a lot wrong about hacking – but not everything.Not too long ago I…

5th September 2025

What is Tor?

Could The Onion Router (Tor) add another layer to your cyber security?Online privacy is becoming more of an issue for users – between websites tracking your movements to better…

3rd September 2025

What is spoofing?

Think: can you trust what you are seeing, or could it be an attacker in disguise?Unless you’re some sort of secret agent, or an actor or cosplayer, it is unlikely that you would…

1st September 2025

What is a proxy site?

Keeping your device separate from the internet, could a proxy site improve your cyber security, or do they pose a risk?Sometimes, having a buffer between you and danger is a great…

28th August 2025

What is jailbreaking?

How can removing software restrictions leave devices as security liabilities?Sometimes, as frustrating as certain rules can be, they are there for good reason. Take speed limits:…

26th August 2025

What are Intrusion Detection Systems?

Like a security camera for your digital world, how could an intrusion detection system (IDS) help to keep you protected?We all have our own version of a security system for our…

21st August 2025

What is the UK Online Safety Act (and what are the cyber security implications)?

New regulations are designed to protect children from adult content: but could these methods pose a security risk?In the last few weeks, the UK government began to enforce a set…

Back to top