The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

A Review of Ransomware in 2020

As if dealing with COVID-19 were not enough, 2020 turned out to be a banner year for another troublesome strain of virus— ransomware. Malicious actors grew more sophisticated, daring and brutal. They also hit a number of high-profile targets. For those of you who...

Ad-injecting malware hijacks Chrome, Edge, Firefox

When searching for things online, has a greater number of ads than usual been popping up at the top of your search results? If it has, and you’re using Microsoft Edge, Google Chrome, Yandex Browser, or Mozilla Firefox, you might have fallen prey to the ad-injecting...

Massive Google Outage Takes Millions Offline

An ongoing issue with Google’s servers has brought down many of the company’s cloud services, leaving millions of users without access to their data. Multiple services including YouTube, Gmail, Google Drive, Google Docs and Google Photos are all currently...

Using drones to improve 5G network security

The introduction of 5G will change the way we communicate, multiply the capacity of the information highways, and allow everyday objects to connect to each other in real time. Its deployment constitutes a true technological revolution not without some security...

Ransomware’s Brutal ‘Second Wave’

Winter is coming and ransomware is well underway with a brutal second wave. And while some may call this just a natural evolution, there is no doubt that attacks are picking up steam and shifting to a far more aggressive and brutal mode. With the confirmed death of a...

How to deal with the escalating phishing threat

In today’s world, most external cyberattacks start with phishing. For attackers, it’s almost a no-brainer: phishing is cheap and humans are fallible, even after going through anti-phishing training. Patrick Harr, CEO at SlashNext, says that while security...

What’s next for cloud backup?

Cloud adoption was already strong heading into 2020. According to a study by O’Reilly, 88% of businesses were using the cloud in some form in January 2020. The global pandemic just accelerated the move to SaaS tools. This seismic shift where businesses live day-to-day...

How to deal with the escalating phishing threat

In today’s world, most external cyberattacks start with phishing. For attackers, it’s almost a no-brainer: phishing is cheap and humans are fallible, even after going through anti-phishing training. Patrick Harr, CEO at SlashNext, says that while security...

Cost of iPhone 12 screen repairs jumps by 41%

The repair of a damaged iPhone, assuming you’re not covered by a warranty, can cost you an enormous amount of money. Perhaps that’s not surprising, given the high price you pay for the phone in the first place, but you may be surprised by the repair costs...

Ransomware In 2020: Four Things You Can Do

As the pandemic hit, the number of remote workers doubled between mid-March and mid-April, and three-year plans for cloud adoption were compressed into three weeks. To say Covid-19 accelerated the world’s digital transformation is a massive understatement....

Office 365 OAuth Attack Targets Coinbase Users

Attackers are targeting Microsoft Office 365 users with a Coinbase-themed attack, aiming to take control of their inboxes via OAuth. Office 365 users are receiving emails purporting to come from cryptocurrency platform Coinbase, which ask them to download updated...

Zoom to begin rolling out end-to-end encryption

Zoom has begun a ‘technical preview’ of its end-to-end encryption (E2EE) offering, available for both free and paid users. Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May...

The threat of cyber attacks

As if cyber attacks could not get any worse, there are reports of a first fatality suspected from a cyber attack, a patient in Germany died from delayed treatment allegedly due to ransomware. This and the recent cyber-attack that brought down New Zealand’s stock...

10 things you need in an email security service

Eradicating email entry Email is still the most used attack vector for opportunistic and targeted attacks and is typically the starting point for social engineering attacks, the delivery vehicle for a dropper or payload attachment, or the link to an exploit kit or...

How to Use the Apple Translate App on iPhone

Apple’s Translate app, introduced in iOS 14, allows iPhone users to quickly translate between languages using text or voice input. With speech output, support for a dozen languages, and a comprehensive built-in dictionary, it’s an essential tool for travelers. Here’s...

Visa: New Baka Skimmer Designed to Avoid Detection

Visa has issued a warning about new digital skimming malware with a sophisticated design intended to circumvent detection by security tools. The card giant said its Payment Fraud Disruption (PFD) group first discovered the “Baka” skimmer in February whilst analyzing a...

Microsoft Teams just added a key new feature

Microsoft has moved its new app Microsoft Lists to generally availability as an add-on to its popular Teams collaboration and video-meeting app. This means the new Lists app, which it announced at Build 2020, is now available to all of Microsoft 365 commercial and...

The State of Civil Aviation Cybersecurity

Technology and cyber systems have become essential components of modern society. Despite the benefit of cyber technologies, insecurities arise. These could affect all systems and infrastructures. More than that, the threat of a cyberattack could very well have a...

Firefox to block redirect tracking

Mozilla has announced a new Firefox protection feature to stymie a new user tracking technique lately employed by online advertisers: redirect tracking. How does redirect tracking work? Online advertisers, web analytics companies and browser makers are locked in a...

Consumers don’t entirely trust smart home tech

Smart home tech is marketed to enhance your home and make life easier. However, UK consumers are not convinced that they can trust the privacy and security of these technologies. To better understand consumers perceptions of the desirability of the smart home,...

27-inch iMac gets a major update

The ultimate desktop now features much faster performance, SSDs across the line, an even more stunning Retina 5K display, and higher quality camera, speakers, and mics   Cupertino, California — Apple today announced a major update to its 27-inch iMac. By far the...

Digital privacy: A double-edged sword

Digital privacy is paramount to the global community, but it must be balanced against the proliferation of digital-first crimes, including child sexual abuse, human trafficking, hate crimes, government suppression, and identity theft. The more the world connects with...

HSBC SMS Phishing Scam Targets UK Victims

People in the UK are being targeted by a new phishing scam designed to trick victims into handing over details of their HSBC bank account. The scam, discovered by litigation specialists Griffin Law, begins with a bogus text message that claims to be from the banking...

Everything Apple Announced at WWDC 2020

Yesterday’s digital WWDC keynote event was jam packed with announcements, with Apple debuting iOS 14, iPadOS 14, macOS Big Sur, watchOS 7, tvOS 14, and, most notably, its work on custom-designed chips that will be used in Macs in the future. This is a list of...

5 keys to protecting OneDrive users

With the dramatic shift toward remote workforces over the last three months, many organisations are relying more heavily on cloud tools and application suites. One of the most popular is Microsoft’s OneDrive. While OneDrive may seem like a secure cloud storage...

Microsoft Patch Tuesday, June 2020 Edition

On Tuesday Microsoft released software patches to plug at least 129 security holes in its Windows operating systems and supported software, by some accounts a record number of fixes in one go for the software giant. None of the bugs addressed this month are known to...

New Microsoft Edge Browser

Microsoft has begun automatically deploying the new Edge web browser to Windows 10 users via Windows Update. “Microsoft has released a new Chromium-based version of Microsoft Edge,” a Microsoft support article tied to KB 4541302 notes. “This new version provides best...

iOS 14: Will it run on your iPhone and iPad?

iOS 14 — along with iPadOS 14 for the iPad — is on the horizon. Apple is likely to give us a preview at the all-virtual WWDC 2020 keynote speech on Monday 20 June, with the release being pushed to iPhones and iPads in the fall. But a new release means the...

What’s New in Windows 10’s May 2020 Update

Cloud Download for Reinstalling Windows Windows 10 has a new “Cloud Download” option you can use when resetting your PC to a default Windows system. When you head to Settings > Update & Security > Recovery and choose to reset your PC and remove everything,...

MacOS 10.15.5 Released: Should You Upgrade?

Apple has released the fourth major update to the sixteenth version of MacOS. With the virtual WWDC just around the corner and the expected announcement of the seventieth version. this release comes as somewhat of a surprise. Nevertheless it is welcome. Headline...

Going phishing: The most imitated big name brands

Cyberattackers are disguising themselves as big name brands to execute phishing attacks, a Check Point Research report found. The data, released on Tuesday, unveils the most imitated brands for these attempts during Q1 2020. Phishing attacks are some of the most...

Online Safety Tech Industry Association Launches

The Online Safety Tech Industry Association (OSTIA) was launched yesterday, bringing together expert companies and advisory bodies to tackle online safety. With support from the National Crime Agency, GCHQ, the Home Office, NSPCC, and led by Cyan Forensics and PUBLIC,...

Microsoft Teams Gets New Yammer Integration

Microsoft have introduced a new Yammer integration for Microsoft Teams. The company have lauched a new app called Communities that introduces stronger Yammer integration for Microsoft Teams. The new app essentially brings Yammer to Teams. “Put simply, it’s Yammer – in...

What is Transport Layer Security or TLS?

Transport Layer Security or TLS is a method of encrypting web traffic. It helps ensure your daily web browsing is safe and secure. Here’s how it works. Transport Layer Security (TLS) is a security protocol that’s mostly used to secure traffic between the web browser...

Zoom is easy. That’s why it’s dangerous.

The technology we love is easy to use. Paying the babysitter on Venmo, sharing a puppy video on Facebook or buying a novel on Amazon is a breeze. Most of the time, this is good. But as the security concerns swirling around Zoom show, there’s a dark side to making it...

Teams Meeting experience improvements

Microsoft have announced the following features will be available to improve your Teams Meeting experience: Background effects in Teams meetings – Roadmap ID 62890 Rolling out beginning in mid April New experience for launching instant channel meetings – Roadmap...

Maybe we shouldn’t use Zoom after all

Now that we’re all stuck at home thanks to the coronavirus pandemic, video calls have gone from a novelty to a necessity. Zoom, the popular videoconferencing service, seems to be doing better than most and has quickly become one of, if not the most, popular option...

Microsoft Teams New Feature – Multi-Window Chat

New Feature: Multi-Window Chat for Microsoft Teams The initial roll-out will be for Windows clients only. Microsoft will provide support for Mac and Linux clients in the coming weeks. Multi-Window Chat is a new Microsoft Teams feature which enables users to multitask...

Threat update: COVID-19 malicious cyber activity

Sourced from the Australian Cyber Security Centre this post is designed to raise awareness of increasing COVID-19 themed malicious cyber activity, and provide practical cyber security advice that organisations and individuals can follow to reduce the risk of being...

Researchers Track Coronavirus-Themed Cyberattacks

Cybercriminals have always used crises and natural disasters to fuel their social engineering activities. The COVID-19 (Coronavirus) pandemic is a massive human crisis, and criminals have been quick to take advantage. People are afraid, and fear is a primary social...

What is spear phishing?

Companies hacked through a single email. Incredible sums of money stolen or paid in ransom. All because an employee clicked on a malicious link. Unfortunately, phishing attacks affect numerous businesses every year. They are difficult to prevent, but getting to know...

How to Check If Your iPhone Was Refurbished

After buying a used iPhone, you might wonder about its history. When first sold, did it leave Apple as a brand new device or one that had been previously refurbished? Luckily, there’s an easy way to tell. Here’s how. Find Your iPhone’s Model Number Open the Settings...

Ransomware Detections Surged 10% in 2019

Trend Micro blocked over 52 billion unique cyber-threats in 2019, 61 million of which were ransomware, according to its annual roundup report. The security firm revealed that email remained by far the most popular threat vector, accounting for 91% of all threats. It...

New Feature: Poll added to Outlook

End users will no longer need to download the Quick Poll add-in from the store and manually install it in Outlook to create a poll after we pre-install the Poll add-in. Microsoft will be gradually rolling this out to Outlook for Mac and Outlook on the web (desktop)...

UK Updates Ports Cyber Security Guidance

The UK Department for Transportation has updated their Cyber Security for Ports and Port Systems good practice guide. This updates the previous 2016 version, and provides actionable advice on: developing a cyber security assessment and plan for important assets,...

Sports Giant Decathlon Leaks 123 Million Records

French sporting retail giant Decathlon has become the latest big brand to expose user data via a misconfigured database, leaking over 123 million records including customer and employee information, according to researchers. A team at vpnMentor uncovered the 9GB...

CYBER SECURITY CHALLENGES FOR MARITIME INDUSTRY

In the last few decades, the maritime and offshore industries have gone through some considerable changes, globally. As most of the operations and proceedings of this industry have been evolving to a faster, better, and developed methodology, that is, digital...

2020: A year of deepfakes and deep deception

Over the past year, deepfakes, a machine learning model that is used to create realistic yet fake or manipulated audio and video, started making headlines as a major emerging cyber threat. The first examples of deepfakes seen by the general public were mainly amateur...

Mac threats overtake Windows for the first time

It’s generally been accepted that Mac systems are much safer than Windows, but that could be starting to change as a new report shows Mac threats are growing faster than their Windows counterparts for the first time ever. Malwarebytes latest annual State of...

When do you plan to upgrade to 5G?

The smartphone will remain the dominant consumer device into the new decade, but the arrival of 5G will not guarantee a surge in device upgrades, according to a GSMA Intelligence research. 5G upgrade Based on the results of a survey of 38,000 respondents across 36 key...