The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

Hackers go phishing for the holidays

It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to be especially vulnerable to phishing attacks. Just one click on a phishing link in a...

Nuclear Bot Author Arrested in Sextortion Case

Author: Brian Krebs Last summer, a wave of sextortion emails began flooding inboxes around the world. The spammers behind this scheme claimed they’d hacked your computer and recorded videos of you watching porn, and promised to release the embarrassing footage to all...

Zoopla repels cyber attack on its Alto software

Zoopla has repelled a cyber attack on its Alto property software – with no breach of customer agents’ personal data. It has sent an email to all its Alto customers, explaining the attack – which led to a temporary break in the service – and outlining...

ISP 1&1 Hit With €9.6 Million GDPR Fine

Internet service provider (ISP) and hosting company 1&1 has been fined nearly €10 million ($11m) by Germany’s GDPR watchdog for data protection failures in its call centers. The United Internet subsidiary, which operates across Europe and the Americas, will be...

The hidden risks of cryptojacking attacks

For any business, privacy and security are a constant concern. The variety and velocity of attacks seeking to infiltrate corporate systems and steal vital business and customer information seem never-ending. Given the very public repercussions of certain types of...

AWS Has New Tool For Those Leaky S3 Buckets

At its re:Invent event under way in Las Vegas, Amazon Web Services (AWS) dropped the veil on a new tool to help customers to avoid spewing data stored on its S3 (Simple Storage) service to world+dog. “Access Analyzer for S3 is a new feature that monitors your...

5G is here, now what?

5G is being positioned as a “network of networks” that will encompass public and private components, licensed and unlicensed spectrum, and even expand beyond cellular, to satellite communications. In reality, 5G will only be one component of the enterprise vertical...

Chrome To Start Blocking Mixed Content Pages

Google has announced that it will begin blocking mixed content on https:// pages by default. The reveal was detailed on the Chromium Blog, which stated that the change was being implemented to improve security and privacy. According to the blog, there has been...

What’s next for 5G?

The future of 5G lies in the enterprise, states ABI Research. Use cases across different vertical markets, such as industrial automation, cloud gaming, private Long-Term Evolution (LTE), and smart transport systems, will become pervasive, and will unlock new...

macOS Catalina: Security and privacy improvements

Apple’s macOS Catalina (v10.15), a new major release of its desktop operating system, comes with many functional and security and privacy improvements. The former include a new game subscription service, a feature that extends Mac desktops with iPad as a second...

Year-over-year malware volume increased by 64%

The most common domains attackers use to host malware and launch phishing attacks include several subdomains of legitimate sites and Content Delivery Networks (CDNs) such as CloudFlare.net, CloudFront.net (which belongs to Amazon), SharePoint and Amazonaws.com, along...

Holiday Booking Sites Hit by Skimming Attack

People using mobile apps to book hotel rooms for their vacations have been targeted by a skimming attack. Research by cybersecurity company Trend Micro discovered that a series of incidents took place earlier this month in which the booking websites of two well-known...

Key threats and trends SMB IT teams deal with

MSPs are significantly more concerned with internal data breaches and rapidly evolving technology practices, whereas internal IT teams are more concerned with employee behavior/habits, according to a Central by LogMeIn report. The global survey, which polled 500 IT...

What is Malware Flux and How Can You Avoid it?

Cybersecurity has developed a lot recently, especially from a software perspective. From private usage to enterprise cybersecurity, the whole sector has drastically evolved and improved in the past couple of years. Although this may sound positive, it must be pointed...

How passwords paved the way for new technology

On July 15 we lost a major contributor to modern-day IT security – Dr. Fernando Corbato, the inventor of the password. Back in the early 1950s, computers could only do single processing jobs. Due to this limitation, it meant that multiple users could use the same...

Apple Introduces New Migration Feature for iPhones

Apple released new updates for iOS, watchOS, and the HomePod on 22nd July. The latest updates are stable releases for the operating systems and are available to the public instantly. The new iOS release, version 12.4, introduces a new migration feature for the iPhone....

Malwarebytes Launches Malware Remediaton Service

Malwarebytes today launched a malware removal service that makes first responders in the form of cybersecurity professionals available on-demand to organisations currently under cyberattack. Kevin Latimore, enterprise malware removal specialist for Malwarebytes, said...

Tricking attackers through the art of deception

In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking attackers into overextending and exposing themselves. To deceive attackers, an organization’s...

Summer heightens cyber security risks

You might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat protection specialist Lastline reveals many security professionals believe their organisations...

How to enable DNS-over-HTTPS (DoH) in Firefox

The DNS-over-HTTPS (DoH) protocol is currently the talk of the town, and the Firefox browser is the only one to support it. However, the feature is not enabled by default for Firefox users, who will have to go through many hoops and modify multiple settings before...

‘Budget’ MacBook Pro refresh incoming

It appears that Apple is getting ready to release a new MacBook Pro, according to FCC filings. The filings, which are no longer available but were picked up by several eagle-eyed tech sites, refer to a laptop with the model number A2159, which lines up with a filing...

IoT devices becoming an increasing security risk

  The rise in IoT devices may be leading to better connectivty and a boost in your Netflix consumption, but could also be putting your home at risk of cyberattack, new research has claimed. A report from security firm Avast and Stanford University has found that...

Cyber security news round up

June’s cyber security news round up features NHS Highland apologiing following reports the email addresses of almost 40 people who have HIV were made public by mistake. Elsewhere a report has suggested the healthcare cyber security market is on track to reach £21.5bn...

Microsoft StaffHub to be retired

Effective October 1, 2019, Microsoft StaffHub will be retired. Microsoft are building StaffHub capabilities into Microsoft Teams. Today, Teams includes the Shifts app for schedule management and additional capabilities will roll out over time. These changes are part...

One trillion phishing emails sent every year

  Phishing remains one of the most useful tools in a cybercriminal’s arsenal as new research from Valimail has revealed that at least 3.4bn fake emails are sent out worldwide each day. The firm’s latest quarterly report, Email Fraud Landscape for...

Latest phishing tricks

Phishers are continually coming up with new tricks to get users to click on malicious links and share sensitive login information. Enterprise phishing attacks predominantly take the form of simple credential phishing emails, i.e., attempts to trick an employee into...

Multi-factor authentication for online services

Advice for organisations on implementing multi-factor authentication (or two-factor authentication) to protect against password guessing and theft on online services. This guidance describes how to use multi-factor authentication (MFA) to mitigate against password...

Setting up two-factor authentication (2FA)

How setting up 2FA can help protect your online accounts, even if your password is stolen. Introduction This guidance explains how you can set up two-factor authentication (2FA) on your important online accounts. Doing this makes it harder for criminals to access your...

End user device (EUD) security guidance

Guidance for organisations deploying a range of end user device platforms as part of a remote working solution Introduction Modern smartphones, laptops and tablets provide users with great flexibility and functionality, and include security technologies to help...

Emotet Malware – What is it?

Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)...

Google Chrome to get a Reader Mode

Google’s Chrome browser will get a Reader Mode, similar to the one found in competing browsers like Firefox and the old Microsoft Edge. The feature is currently under development, but Chrome Canary users can test it starting today. Chrome’s Reader Mode...

Massive SIM swap fraud spotted in the wild

– Cybercriminals are heavily relying on such type of frauds to steal money from users, especially in Brazil and Mozambique. – Tricksters are using social engineering and simple phishing attack to take control of a victim’s phone. SIM swap fraud is a type...

Get Ready for the First Wave of AI Malware

While viruses and malware have stubbornly stayed as a top-10 “things I lose sleep over as a CISO,” the overall threat has been steadily declining for a decade. Unfortunately, WannaCry, NotPetya, and an entourage of related self-propagating ransomware abruptly...

iMac gets a 2x performance boost

Apple has updated its iMac line with up to 8-core Intel 9th-generation processors for the first time and powerful Vega graphics options, delivering dramatic increases in both compute and graphics performance. From consumers to pros alike, users will notice their iMac...

Ransomware’s New Normal

GandCrab’s evolution underscores a shift in ransomware attack methods. Don’t be fooled by the drop in overall ransomware attacks this past year: Fewer but more targeted and lucrative campaigns against larger organizations are the new MO for holding data...

Social Media Drives $3.2bn+ in Black Hat Profits

Social media platforms are a major conduit for malware and a highly effective marketplace for black hat resources, generating cybercrime worth over $3.2bn every year, according to Bromium. The security vendor’s latest report, Social Media Platforms and the Cybercrime...

STOP ransomware claims even more victims

Despite having been ‘in the wild’ for some weeks now, infections caused by STOP ransomware have continued to rise. Perhaps somewhat ironically, those most affected (at the moment) appear to be software pirates. Security analysts have discovered the STOP executable is...

Scammers Fall in Love with Valentine’s Day

Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks. US-CERT and Cupid don’t often keep company, but this Valentine’s Day is being marked by new threats to those seeking romance and new...

Introducing background blur in Skype

We’ve all had those moments: You’re about to video call your parents and your laundry is all over the place, or you’re about to have a meeting with a potential investor and your business plan is on a whiteboard behind you, or you’re being interviewed on live...

More Money, More Worries About Cyber Risk

Executives at financial services companies are increasingly concerned about risks, but as technology becomes more integrated in managing financials, more executives say that cybersecurity is increasingly becoming the most important type of risk, according to a new...

What is 5G?

The 5G band is the next generation of broadband connection being rolled out by wireless mobile carriers globally. It will replace the existing standard, 4G LTE. While carriers upgrade existing network equipment to 5G, it will live alongside your 4G mobile wireless...

Can You Spot When You’re Being Phished?

Identifying phishing can be harder than you think. Alphabet subsidiary Jigsaw has made a quiz with Google to test your phishing awareness skills. To make this quiz, the team drew from materials they’ve used to train thousands of journalists, political figures...

What Is A Cloud Access Security Broker (CASB)

A cloud access security broker (CASB) is a software tool or service that sits between an organisation’s on-premises infrastructure and a cloud provider’s infrastructure. A CASB acts as a gatekeeper, allowing the organisation to extend the reach of their...

WPML Plugin Hacked, Thousands Of Users Spammed

– WPML Plugin was reportedly hacked by a former employee, who also sent out spam emails to its users regarding the site’s security. – WPML allows multilingual websites to work smoothly under WordPress. WPML, a plugin supporting multilingual websites in...

DuckDuckGo Integrates Apple Maps Into Search Results

Search engine DuckDuckGo announced today that it has licensed Apple Maps for its map- and address-related search results on both mobile and desktop. “We’re excited to work closely with Apple to set a new standard of trust online, and we hope you’ll enjoy this update,”...

Remote Working Leading To More Data breaches

As beneficial as remote working is, it comes with a few problems of its own. One, and a major one at that, is security. According to new figures from CybSafe, every third business has suffered a data breach thanks to its remote workforce, all in the past 12 months....