Subscribe to Blog Updates

Case Study: Geolocation Analysis Uncovers Ex-Employee Posting Malicious Content Online

Posted: 24-Feb-2016 11:00:00

IT Group was approached by a prestigious independent school which was troubled by libellous posting on Facebook.

Read More

Announcement of Head Office Relocation

Posted: 18-Feb-2016 10:23:08

(Image source: Eckersley Property)

We are delighted to announce that due to expansion and continued growth we will be moving our head office in Preston to a new location on Friday 19th February 2016.

Our new head office address is Unit 5 Lockside Office Park, Riversway, Preston, PR2 2YS.

Read More

Google discover flaw that could leave hundreds of thousands of devices vulnerable

Posted: 17-Feb-2016 15:51:11

It isn’t every day that a new security vulnerability is found that can claim to expose huge numbers of systems to attack, but 2015’s Heartbleed vulnerability opened the eyes of many in the security field that systems they have trusted for years may not always be as secure as they once believed.

Read More

Case Study: Rogue Employees Copy Source Code for Rival Company

Posted: 16-Feb-2016 15:28:58

A large software development company contacted IT Group in 2015 as they suspected two of their employees were developing software for another company. A forensic image and initial examination of the employees' computers was conducted with pre-agreed search terms from the client.

Read More

The Role of a Computer Forensic Expert

Posted: 12-Feb-2016 11:00:00

Computer forensic evidence first started to be applied to serious crime in the mid 80’s when personal computers started to be used in greater numbers and criminals deployed PCs for fraud and other crimes.

Read More

Phishing Emails - The Double Bluff

Posted: 09-Feb-2016 13:00:00

Consumers are growing wiser to what is considered an appropriate security protocol when they engage with an organisation, and now more than ever companies are making a point in their advertisements and on their websites that they will never ask for your password over the phone or ask you to submit account details from a link in an unwarranted email.

Hackers know that consumers are becoming more suspicious, especially when they receive an email that is littered with calls to action, encouraging them to click a link or ring a number to verify their account information.

Read More

Cyber Reconnaissance & Rise in Whaling Attacks

Posted: 02-Feb-2016 11:00:00

Reconnaissance (recon) is a technique used by hackers where they directly focus on an organisation or an individual and gather intelligence that enables them to carry out a cyber attack.

During recon the hacker will always have a specific target, whether it be an organisation, personnel within the organisation or an individual. They will track and monitor specific behaviours to establish any vulnerabilities, potential routes of entry or weak points and they will then attempt to exploit these in order to gain access.

Read More