Archive for the “Security” Category

Historic Hacks: Gary McKinnon

by Kelly Kirkham

In our Historic Hacks segment, we like to look back at internet events that shocked, surprised, or horrified us. Today we look at the biggest military computer hack of all time, even though it might not have occurred for the reasons you might think… Eyes on the skies We’ve all heard tales of Area 51…

SSL, TLS And Their Role In Security On The Internet

by Hayden Smith

When the internet was first devised, it was envisioned as a tool to connect universities, research establishments, and the military. As computers were so expensive at the time, the number of internet users were limited. This also meant that little emphasis was placed on public security with regard to the technologies being developed. All data…

Historic Hacks – Kevin Mitnick

by Hayden Smith

This time on historic hacks, rather than concentrating on a specific hack or piece of malware, we’ll be looking at the hacker’s profile. In this case, we’ll be looking at some of the exploits of one of the most famous hackers: Kevin Mitnick. Mitnick started hacking as a teenager. At just 13 years old, he…

What is Public Key Encryption And Why Does It Matter?

by Hayden Smith

Public key encryption is one of the most used security technologies on the internet. In this post, we provide an overview of what private key encryption is, how it works and why it’s important. How does encryption work? When using encryption, the message being sent is combined with a key in the encryption algorithm. This…

Historic Hacks – The Morris Worm

by Hayden Smith

Welcome to Historic Hacks, where we’ll be shining a light on some of the more notable hacks in history. Today we’ll be traveling back to the 2nd November 1988, and looking at the Morris worm. The Morris Worm story The Morris Worm was created by Robert Tappan Morris, whose claimed intent was to try to…

Hashing Explained

by Hayden Smith

When it comes to security, the weakest link in the chain is usually the good old-fashioned password. Hackers often publish tables of usernames and passwords as they find them when breaking into systems, meaning that it’s important to keep the password data secure. Techniques such as ‘hashing’ and ‘salting’ are commonly used in order to…

What Is Encryption?

by Hayden Smith

In recent years, encryption has become something of a hot topic. Mentions of the word have increased dramatically in light of Edward Snowden’s government surveillance leaks. Security revelations have led to a number of disagreements between governments and businesses over the use of encryption and the public’s access to encryption technologies. So you might be…

GDPR, Consent And You

by Hayden Smith

You have likely have noticed (unless you have been on another planet over the past year) is that the General Data Protection Regulation came into force in May this year. This is a European Union regulation that affects anyone who handles any information about anyone within the European Union. This makes it a fairly wide-ranging…

Hackers and You – General Tips For Avoiding Hackers

by Hayden Smith

Welcome to the final part of our series looking at hackers and you. Previously we’ve covered who hackers are and what they do, how to protect your VPS from hackers and what to do if your VPS does get hacked. In this final post, we’ll be looking over some general tips to help you avoid…

Hackers And You – Catching A Hacker And What To Do If Your Server Gets Hacked

by Hayden Smith

Previously in our series on Hackers and You, we have looked at who hackers are, why they hack, how they go about hacking and what you can to do to try and stop them. Unfortunately, even if armed with all the knowledge and defense in the world, a hacker could still get into your server. So…

over 200,000 servers launched

and counting worldwide...