Microsoft have finally switched on new webmail encryption tools in order to make it more difficult for personal emails to be accessed by cybercriminals and government snoops. These encryptions have been added to outlook.com and all of Microsoft’s other mail domains such as Hotmail.
An apology has been sent out to BT users after problems developed last week preventing BT customers from connecting to social media, banking and shopping sites. It is unknown as to the number of customers affected, however the issues were reported across different parts of the UK including Cornwall, Eastbourne, […]
A new Kill Switch is to be added to Android and Windows phones in an attempt to deter thieves from stealing mobile devices. The new feature will allow for data to be remotely erased upon theft and the device locked, making it nothing but a lump of glass and plastic […]
Up to 10,000 patients may have been affected after a Birmingham based private health company called Diagnostic Health saved unencrypted NHS patient details onto Google Drive, allowing access across staff members using a singular password. The NHS used Diagnostic Health to refer patients for ultrasound scans.
The Chinese made smartphone, Star N9500, sold for about £120 on eBay and gained attention of users for it’s heavy resemblance to the Samsung Galaxy S4 whilst remaining one third of the price to the heavily branded smartphone. The phrase “too good to be true” can be used in many […]
A new payment method called Charge To Mobile has been released by network provider O2, allowing Google Play users to purchase up to £30 worth of applications and have it charged directly to their monthly/pay as you go phone contract. This payment method is becoming rapidly more popular, achieving over […]
It was reported last night that Tweetdeck had been taken offline in order to address a security issue where an XSS security vulnerability was spotted, resulting in the compromise of many TweetDeck accounts that were logged in. Users were locked out of their accounts whilst the service as taken offline, […]
New tests have been developed by combining government intelligence about existing cyber-threats with those that the security industry assess to be risks in order to increase efforts to protect UK financial institutions. Hacking represents the growing risk within the financial sector therefore the new cyber-security strategy CBEST was created.
Spotify have announced yesterday of a security breach that allowed for unauthorized access to systems and internal company data. The security breach has been noted as small scale, affecting only one user who is believed to have been hacked due to the use of outdated Spotify software that no longer […]
EBay, the online Marketplace with 128 million active users announced this week a cyber-hack that compromised their systems between late February and early March. Cyber attackers accessed the information after obtaining a small number of employee login credentials which was only discovered 2 weeks ago. The files accessed contained customer […]
The GCHQ, or Government Communication Headquarters, have had a 30 page legal complaint filed against them for unlawful hacking in order to help surveillance efforts. Millions of devices have been affected by the UK Intelligence Service in order to spy on citizens and scoop up personal data. No comment has […]
The Federal Trade Commission (FTC) announced earlier this month that Snapchat, a popular image and video sending application, suffered an alleged security breach in January this year when the names and numbers of approximately 4.6 million users were said to have been collected from Apple iOS devices. It is reported […]
Now that Windows have stopped updates for XP, users are now stuck with the predicament of risking their PC’s protection or upgrading to a newer operating system. Windows 7 or 8.1 would be the first consideration for users, however older hardware may be unable to run the newer, more demanding […]
Internet security threats have become very popular recently since the Heartbleed outbreak, however the most recent security threat involves Apple’s iOS 7. It has been reported that the new software holds a security risk for the use of emails on it’s devices due to attachments in email not encrypting. This […]
Cyberoam offer enterprise-class network security and flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakages. They provide network security appliances that are available as unified threat management and next generation firewalls, including inspection firewalls, virtual private networks (VPN), intrusion protection systems […]
In 2000, Microsoft were the market leader in providing IT software and were deemed as the bully company who beat all competition and were left shining with high sales and market share. Despite this success, Microsoft missed out on the opportunity of expanding into handheld devices, allowing for Apple to […]
There has recently been a lot of online worry about the Heartbleed bug however many people are still unaware of what it is and what they should do if they have been affected. The Heartbleed bug is a virus which is found in the open SSL software library. It is […]
It’s been a hard weekend for AOL who are currently resolving a hacking crisis that occurred on Sunday. Whilst it is unclear as to how many users have been compromised at this point, it is believed that less than 1 percent of users have been affected however AOL aim to […]
Comtek are proud to become one of AirTight’s Platinum Partners after 4 employees completed and passed their AirTight engineers training and certification. For those who don’t know what AirTight is, it’s a company that provides secure wireless protection using WIPS (Wireless Intrusion Prevention System) in order to protect from wireless […]
In many ways, IT security has always been an important talking point for organisations. Ever since computers started to be used in the workplace – and particularly when large-scale networks and internet usage became commonplace – organisations have had to have an eye on IT security. In recent times, however, […]