Security


Encryption Added To Microsoft Webmail Services

Microsoft have finally switched on new webmail encryption tools in order to make it more difficult for personal emails to be accessed by cybercriminals and government snoops. These encryptions have been added to outlook.com and all of Microsoft’s other mail domains such as Hotmail.


Apologies From BT After Broadband Issues

An apology has been sent out to BT users after problems developed last week preventing BT customers from connecting to social media, banking and shopping sites. It is unknown as to the number of customers affected, however the issues were reported across different parts of the UK including Cornwall, Eastbourne, […]


Smartphone Theft To Be Deterred By New ‘Kill Switch’

A new Kill Switch is to be added to Android and Windows phones in an attempt to deter thieves from stealing mobile devices. The new feature will allow for data to be remotely erased upon theft and the device locked, making it nothing but a lump of glass and plastic […]


Private Health Company Investigated After Poor Patient Data Storage Procedures

Up to 10,000 patients may have been affected after a Birmingham based private health company called Diagnostic Health saved unencrypted NHS patient details onto Google Drive, allowing access across staff members using a singular password. The NHS used Diagnostic Health to refer patients for ultrasound scans.


Precautionary Measures Taken After Spyware Detected In Chinese Smartphone

The Chinese made smartphone, Star N9500, sold for about £120 on eBay and gained attention of users for it’s heavy resemblance to the Samsung Galaxy S4 whilst remaining one third of the price to the heavily branded smartphone. The phrase “too good to be true” can be used in many […]


Pay For Your Google Play Purchases Directly Through Your Contract With O2

A new payment method called Charge To Mobile has been released by network provider O2, allowing Google Play users to purchase up to £30 worth of applications and have it charged directly to their monthly/pay as you go phone contract. This payment method is becoming rapidly more popular, achieving over […]


TweetDeck Becomes Next Victim In A List Of Security Breaches

It was reported last night that Tweetdeck had been taken offline in order to address a security issue where an XSS security vulnerability was spotted, resulting in the compromise of many TweetDeck accounts that were logged in. Users were locked out of their accounts whilst the service as taken offline, […]


Tests Produced To Guarantee Cyber Security In Banks

New tests have been developed by combining government intelligence about existing cyber-threats with those that the security industry assess to be risks in order to increase efforts to protect UK financial institutions. Hacking represents the growing risk within the financial sector therefore the new cyber-security strategy CBEST was created.


eBay User? Maybe It’s Time To Change Your Password 1

EBay, the online Marketplace with 128 million active users announced this week a cyber-hack that compromised their systems between late February and early March. Cyber attackers accessed the information after obtaining a small number of employee login credentials which was only discovered 2 weeks ago. The files accessed contained customer […]


Complaint Filed Against GCHQ For Privacy Hacking

The GCHQ, or Government Communication Headquarters, have had a 30 page legal complaint filed against them for unlawful hacking in order to help surveillance efforts. Millions of devices have been affected by the UK Intelligence Service in order to spy on citizens and scoop up personal data. No comment has […]


Snapchat Security Breach 1

The Federal Trade Commission (FTC) announced earlier this month that Snapchat, a popular image and video sending application, suffered an alleged security breach in January this year when the names and numbers of approximately 4.6 million users were said to have been collected from Apple iOS devices. It is reported […]


Now The XP Updates Have Gone Out The Window, Why Not Try Linux? 1

Now that Windows have stopped updates for XP, users are now stuck with the predicament of risking their PC’s protection or upgrading to a newer operating system. Windows 7 or 8.1 would be the first consideration for users, however older hardware may be unable to run the newer, more demanding […]


Apple iOS 7 Mail Security Threat

Internet security threats have become very popular recently since the Heartbleed outbreak, however the most recent security threat involves Apple’s iOS 7. It has been reported that the new software holds a security risk for the use of emails on it’s devices due to attachments in email not encrypting. This […]


Cyberoam Network Security at Comtek 1

Cyberoam offer enterprise-class network security and flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakages. They provide network security appliances that are available as unified threat management and next generation firewalls, including inspection firewalls, virtual private networks (VPN), intrusion protection systems […]


Windows XP: Is It Time To Upgrade?

In 2000, Microsoft were the market leader in providing IT software and were deemed as the bully company who beat all competition and were left shining with high sales and market share. Despite this success, Microsoft missed out on the opportunity of expanding into handheld devices, allowing for Apple to […]


We’ve all heard of the Heartbleed Bug, but what is it?

There has recently been a lot of online worry about the Heartbleed bug however many people are still unaware of what it is and what they should do if they have been affected. The Heartbleed bug is a virus which is found in the open SSL software library. It is […]


Comtek and AirTight Networks

Comtek are proud to become one of AirTight’s Platinum Partners after 4 employees completed and passed their AirTight engineers training and certification. For those who don’t know what AirTight is, it’s a company that provides secure wireless protection using WIPS (Wireless Intrusion Prevention System) in order to protect from wireless […]


IT Security – Are You More Wary Of The Phrase Than The Processes? 1

In many ways, IT security has always been an important talking point for organisations.  Ever since computers started to be used in the workplace – and particularly when large-scale networks and internet usage became commonplace – organisations have had to have an eye on IT security. In recent times, however, […]