By James Pink Unfortunately, almost without exception, the answer is “not very”. Most SME Businesses’ seem to have a blind faith that they will somehow miss the attention of the thousands of very clever Criminal Hackers around the world and escape unharmed, un-robbed and un-fined when their Data is compromised. Two common factors […]
READ MORECrypto-Currency Ads to be Banned by Google
By Lewis Rogers Crypto-Currency has seen a meteoric rise to economic royalty in the past couple of years with stories appearing almost daily about how someone turned their small bitcoin wallet into millions of pounds almost overnight. Crypto-Currencies such as bitcoin are earned through a technique known as “mining” high powered computers solve extremely […]
READ MOREBitcoin Billions Laundered by UK Company
By Lewis Rogers A UK company has been linked with the laundering of 650,000 stolen bitcoins, this equates to £4.5billion. the bitcoins were taken by hackers from the Tokyo-based bitcoin exchange Mt Gox, this has left over 10,000 customers empty handed. Mark Karpeles, Mt Gox’s operator issued an apology to investors using the exchange and […]
READ MORECarphone Warehouse fined £400,00
“Left its systems vulnerable by failing to update its software and carry out routine testing” (The Information Commissioners Office in its $400,000 judgement about Carphone Warehouse) Is this you and your business? If you ask Your IT people are sure to say “you’re OK” – but the truth is yes! Few UK SMEs have: A […]
READ MOREThe Dunning-Kruger Effect & Cyber Security
By James Pink The Dunning-Kruger Effect… The psychological term for someone who believes they understand enough not to be caught out, but this illusory superiority leads them to be caught out by the very thing they think they understand. A perfect example: Many people think they understand what a Phishing Attack looks like… until they […]
READ MOREWhat is Spectre and Meltdown?
By Alex Probert Two vulnerabilities have been identified on the main part of a computer component, this component is the processor. The processor’s main job is to handle instructions from the user with input and output operations. The processor will essentially predict the information that it may need to improve speed and performance, this is […]
READ MOREHow do I change my Water Supplier & why?
By James Pink Pink Connect partners with Power Solutions UK, who guarantee to provide some of the best Electricity and Gas deal available. However, since April 2017, they have also been able to carry out the same job on Water contracts. Like many businesses, we didn’t “get round to it” until we got the latest […]
READ MOREHistory of Cryptography
By Alex Probert Cryptography has been detached from steganography, which was used to conceal important messages. It has been around since pre-1900 BC; one device was called the Scytale, which was a wooden stick with a long scroll attached with random letters on it. To decrypt the message, the user would need to wrap the […]
READ MOREBitcoin wallets HACKED? Iranian v3.0
By Tyrese Garvie 22nd December 2017 15:16pm Bitcoin (BTC) has plummeted over 30% over the last few days and more so today – many people are claiming that the bubble has finally popped, but others are claiming that it was hacked by a group named ‘Iranian v3.0’. It all started with a message posted on pastebin.com […]
READ MOREIt will be a legal right to demand high-speed broadband
By Tyrese Garvie & Lewis Rogers In the past few years, we have seen an increase in broadband speeds, with there now being more locations than ever around Britain with 4G coverage. So would it surprise you, if I told you that over 1 million houses and offices in the UK are without the sufficient broadband […]
READ MORE