Category: Blog

Will they send a SMS or won’t they?

Recently I stumbled across a publication from HMRC, it stated the forms of communications they would use to contact the tax paying public. Example messages were displayed in an attempt to ‘whitelist’ communications. Basically, if you receive correspondence that looks like the examples listed, it could be from them. Some excerpts from the article found here read: Text messages HMRC is… Read more →

Lawyers Must Recognise the Value of their Data

This is a copy of a guest blog authored for Ascertus Ltd, feel free to read the post over here.   Whilst content in our 9 – 5 employment, slightly resentful that our personal activities aren’t getting the attention they deserve, it’s easy to forget about the true value of things around us – especially their inherent value to other walks… Read more →

How to Handle A Data Breach

To a modern business, a data breach can have devastating effects. We have seen TalkTalk hastily bungle, Sage coyly dawdle and much more generally mess it up, it’s got to change. We don’t spend all day hunting these elusive beasts either, but we have had our involvement in both mentioned breaches and feel we could offer some public insight to the very elusive modern mishap.… Read more →

Sage UK Payroll Data Breach

Personal details and bank account information for employees of as many as 300 large UK companies may have been compromised as part of a data breach at Sage, a UK accountancy software group. August 11th, 2016 Sage UK Payroll services started notifying customers of a data breach effecting their staff payroll systems. A rather generic statement was believed to be provided… Read more →

InfoSec Interviews – Richard De Vere

Original article by IT Governance: here So a while back I was interviewed by Lewis Morgan from the IT Governance Blog and thought i’d share this on the site. It is a little tongue in cheek reading it back actually! But genuine none the less.   First, let’s quickly cover the basics: what is social engineering? Well, a good question straight… Read more →

How we Support Magicians, Fraudsters & Hackers

One advantage of running a small boutique consultancy is I get to steer the business activity towards subjects I personally find interesting. Throughout my career, I have always been fascinated with frauds and that is where my focus normally lies. It’s that magic-like performance for me that has a very similar feeling to the showmanship of great magicians. When you watch a magic… Read more →

Yorkshire Cyber Security Event – A reflection of the real risks

The AntiSocial Engineer Limited is supporting the Yorkshire Cyber Security Cluster to announce the first annual Yorkshire Cyber Security Event taking place on the 12th May at the 3m Buckley Innovation Centre in Huddersfield. We will be talking about our recent research into SIM Swap Fraud and sharing tips on how to keep safe online, we are even providing the refreshments… Read more →

Bask in the glory of the bin

When considering the security threats your organisation will encounter you would be forgiven if the humble bin slipped your mind. Every instance of this invisible cyber, hacking, scare story we receive on the media these days is referring to ‘complex and sustained attacks’. The innocent rubbish receptacles definitely don’t seem complex… But there is a wealth of knowledge hidden amongst… Read more →

The Problem With Know-it-all Security.

I am not one for quotes and ‘Facebook philosophy’ memes but recently, I was reminded of my favourite quote on a certain social media platform: “The only true wisdom is in knowing you know nothing.” – Socrates The pursuit of education can convert a criminal into a solicitor; it can envelop minds and have a plethora of benefits. Dietary education can… Read more →