Alexa metrics
Fast Answers

A Brief History of Hacking – Part 3

26.10.2011 by Liz Walker

2007 – present, the world starts paying attention. Jonathan Evans' message and the subsequent recognition of the importance of data security helped, but the criminals had seen the profit potential of cyber crime and by then had huge networks and spending power behind them. In the past few years we have made huge moves forward in both our awareness and our defences, but the big attacks have kept coming. In 2008 Heartland Payment Systems lost $140M in stolen credit card details and the end of 2008 saw a further attack against a nation - Georgia.  In 2009 Ghostnet, another cyber…

A Brief History of Hacking – Part 2

25.10.2011 by Guest

2000-2007 hacking becomes big business. The 2000s saw rapid change in the methods and motivations of hackers. Following 9/11, the security services again cracked down, driving hackers further underground and into the hands of organised crime. Combined with the increasing…

A Brief History of Hacking – Part 1

24.10.2011 by Guest

The 50s-90s: the birth of global communications and the birth of hacking.   Cyber security has been a lot higher on the agenda these last few years. Governments, media and corporations, large and small have been talking about it, and…

Q&A With Cyber Expert Alberto Redi

24.10.2011 by Alice Cullen

As part of global Cyber Security Awareness Month, UKFast has teamed up with a range of cyber security experts to raise the profile of staying safe online. This week we spoke with Alberto Redi, CEO of Zone-H - whose website…

The Digital Handcuffs of eBooks

21.10.2011 by Guest

This is a guest post from Kevin Duffy, Publisher at BLUEMOOSE BOOKS. www.bluemoosebooks.com.   This is a truism. When you buy a digital book it isn't the same as buying its paper equivalent. You are buying the right to read…

New Wave of Cyber Threats

20.10.2011 by Liz Walker

Approximately one year ago a virus was found targeting high value infrastructure in Iran. These targets included their nuclear programme, water plants and industrial units - sending many of the centrifuges at Tehran's nuclear facilities spinning out of control. This…

Content is King

19.10.2011 by Guest

Sara Slack has been involved with online content for the past decade, making her first website when she was still at school. Her passion for quality literature and content led her from being a review blogger to the Managing Director…

Simple Tools for Testing Cyber Security

18.10.2011 by Guest

This is a guest post by Richard Clinker. Richard has been in the IT industry for 15+ years working with systems running ATM networks and internet banking in an operations role. For at least ten of those years, he has…

Microsoft Reveals Windows 8 Details

14.10.2011 by Alice Cullen

Microsoft has given us a sneak peek into a few details about its Windows 8 developments and revealed some improvements it has made to the new Task Manager. In the Building Windows 8 blog the week, group program manager Ryan…

Microsoft Zero-Day Security Intelligence Report

13.10.2011 by Liz Walker

Microsoft has released its latest Security Intelligence Report. It focuses on zero-day exploitation and the risks Microsoft customers face from it. The analysis looked at threats detected by the Malicious Software Removal Tool (MSRT) during the first half of 2011.…