Home Tags Liverpool

Tag: Liverpool

Is your child a hacker? Liverpudlian parents get warning signs checklist

Do they use 'the language of hacking', including referring to themselves as a 'hacker'? Hot on the heels of Liverpool being awarded the European Capital of Culture for 2008 comes a charity programme, run by YouthFed, titled Hackers to Heroes.…

Car accident claims dominate mobile scam calls in 2016, according to...

Press Release London, 30 December 2016 - Scammers are increasing the number of calls where they claim ‘our records show you’ve been in a car accident’, according to call-blocking and caller ID Company, Hiya (www.hiya.com).

These types of calls were the most reported scams of 2016, says Hiya, closely followed by PPI calls, and calls claiming you’ve won a prize. The car accident scam peaked in October - the worst month of the year for mobile phone scams overall – with growth of 84% in the period January to November. PPI scam claims peaked in November and saw an 81% growth over the year.

The UK leads Europe in that it has the highest percentage of nuisance calls, at a significant 13% of all calls placed. “Defrauding people is big business, which is why the number of scam calls continues to grow and more elaborate schemes appear,” says Alex Algard, CEO of Hiya. “Scammers are getting more sophisticated.

They mask the calls by using common area codes so people answer them. Our advice is to be careful and trust your instinct.
If an offer sounds too good to be true, then it probably is.” The year in review: Newcomer scam of the year: ‘Lucky Winner’ Worst month for phone scams: October Scam that declined over the year: Betting, down 240% from Jan-Nov, peaked in March Worst area code offenders: (020) London (0161) Manchester (0141) Glasgow (0113) Leeds (0121) Birmingham (01922) Walsall (01268) Basildon (0151) Liverpool (0115) Nottingham (01792) Swansea Top Scams in the UK: Car accident claims, 84% growth over the year, peaked in October PPI scam calls, 81% growth over the year, peaked in November Lucky winner, 64% growth over the year, peaked in October Loan scams, 85% growth over the year, peaked in August All inclusive holiday compensation, 91% growth over the year, peaked in October About HiyaHiya provides enhanced caller ID products and services designed to make the phone experience better. With a database of more over 1.5 billion unique numbers globally, Hiya leverages its expansive algorithms to identify unknown calls and texts and to monitor phone-based threats for consumers and businesses. Hiya screens more than 665 million incoming calls per month, and has detected more than one billion robo, telemarketing and scam calls and texts to date. Hiya is available as a consumer app on Google Android and iPhone and is integrated into the phone experience for T-Mobile and Samsung Galaxy S7 users worldwide.

For more information, please visit www.hiya.com. For more information on the survey, contact:Kate Hartley / Malini MajithiaCarrot Communications0203 770 5836 / kate.hartley@carrotcomms.co.uk

After near misses, careless British drone pilots told to heed Dronecode

EnlargeEmmanuel Dunand/AFP/Getty Images reader comments 7 Share this story In an effort to stamp down on irresponsible drone flights, the Civil Aviation Authority (CAA)—which regulates all flights in the UK—has launched a new version of the "Dronecode." The Dronecode is a set of rules, regulations, and recommendations originally launched in 2015 that stated drones must stay within sight of the pilot, below an altitude of 400 feet (120 metres), that they must stay away from aircraft and airports, and that operators must use common sense to keep others safe. However, according to research conducted by the CAA, only 39 percent of drone owners have actually heard of the Dronecode, with only 36 percent being made aware of it at the time of purchase. To make things a little easier for pilots to remember, the watchdog has come up with a mnemonic aid as follows: Don't fly near airports or airfields Remember to stay below 400ft (120m) and at least 150ft (50m) away from buildings and people Observe your drone at all times Never fly near aircraft Enjoy responsibly While you can't help but feel the CAA stopped trying by the time it got to the letter "O," there's no doubt that some drone pilots could use some common sense. Earlier this month it emerged that airline pilots reported four near misses with drones in a month, including one flying near London's Shard and another at Liverpool airport. One pilot even reported he could identify the particular brand of drone that came within 100 meters of the plane because "his son had the very same model." Drone crime has also soared in the UK, with police being called in to investigate alleged pedophiles filming playgrounds, high-tech drug-runners trying to smuggle contraband into prisons, and even one occasion when a man was caught filming people at an ATM in Northern Ireland. Alongside the Dronecode, the CAA and air traffic control body NATS has also launched dronesafe.uk, which includes the regulator's rules as well as training resources. UK retailer Maplin said it will ensure those that buy drones in the run up to Christmas are aware of the Dronecode at the time of purchase. This post originated on Ars Technica UK

CyberUK 2016: Amulet Hotkey PCoIP Zero Clients Certified as Secure by...

DXZ4 and DXZC PCoIP Zero Clients approved by CESG for use by government and public sector organisations across the UKLondon, UK, May 24, 2016 – Amulet Hotkey Ltd., a leader in design, manufacturing and system integration for remote physical and virtual workstation solutions, today announced at CyberUK in Practice 2016 show, that their PCoIP zero clients have been certified as secure by CESG, the National Technical Authority for Information Assurance within the UK.

Amulet Hotkey is the only PCoIP zero client vendor to receive a certification of this type.

Amulet Hotkey’s DXZ4 and DXZC PCoIP zero clients combine innovative design and manufacturing to deliver simple, stateless and highly secure clients for both mission and business critical environments. Fig 2: UK CESG CPA Certified PCoIP Zero Clients Amulet Hotkey DXZ4 and DXZC clients have now been formally recognized by CESG, the body tasked with assisting Government Departments with cyber security, as being compliant with their Commercial Product Assurance (CPA) scheme for Remote Desktop at Foundation Grade.

This is a result of a joint effort between Amulet Hotkey, Teradici Corporation, Roke Manor Research Test Lab, and CESG to rigorously test against a stringent set of requirements developed to assure security compliance for remote desktop devices in nations such as the UK and US.

Achieving approval for use at the “OFFICIAL” level, both the DXZ4 and DXZC are recommended for government and public sector organisations, including government departments, the police, hospitals, emergency response, command and control centres and local councils. The certification allows government, public sector, as well as security conscious enterprise to enjoy the security and rich desktop experience of Amulet Hotkey PCoIP Zero Clients when connecting to remote 3D graphics workstations or virtual and cloud desktops. “We developed the DXZ4 and DXZC PCoIP zero clients from the ground up to meet and exceed the demanding security requirements of government while addressing the graphic and performance needs of users,” said David Bailey, Group Managing Director and CEO, Amulet Hotkey Ltd. “CESG certification further demonstrates our commitment to delivering robust and secure solutions for mission and business critical environments.” “We are delighted that the CESG have recognized Amulet Hotkey’s PCoIP Zero Clients as meeting the highest security standards for remote desktop devices,” said Jayesh Shah, Vice President Product Management, Teradici Corporation, “PCoIP Zero Clients are the simplest, most secure and easy to manage endpoints with the highest quality user experience.” Amulet Hotkey DXZ4 and DXZC Clients provide key benefits including: CESG CPA Certification – The DXZ4 and DXZC series of PCoIP Zero Clients running firmware 4.8.0 are certified as secure for Remote Desktop Security Characteristic version 1.0 at Foundation Grade.

CESG Certificate number: RDT5722298 Flexible deployment– The DXZ4 and DXZC support a variety of users across multiple locations connecting to remote physical or virtual 3D workstations, VMware Horizon virtual desktops and applications, or Amazon Web Services Workspaces cloud desktops. Mission Critical Design – The DXZ4 and DXZC are engineered for security, reliability, and strict emissions control.

The DXZ4 is the only zero client available with redundant network ports for standard RJ45 copper connections, or SFP slots for either copper or fibre modules. Extensive Endpoint Security - Only display pixels are sent to the client allowing application data to remain locked down in a secure data centre. No sensitive data reaches the endpoint since there is no Windows or Linux OS to patch or upgrade, no hard drive or application data storage. Many other security features including: unique USB security authorization, smartcard, proxcard and security token support, controlled SSL certificate trust store, 256-bit/128-bit AES and NSA Suite B encryption cyphers feature/menu lockdown options as well as IEEE 802.1x network authentication. Exceptional user experience – The DXZ4 and DXZC support dual, quad and octal display configurations for a range of users from mainstream office desktops to the highest performance 3D graphics workstations. Lower power – less than 10W at the desktop eliminates heat and noise to improve the work environment while reducing operational cost. Join Amulet Hotkey at CESG CyberUK in Practice exhibition hall, Liverpool Arena and Convention Center, May 24-25, 2016, for more information visit https://registration.livegroup.co.uk/cesg_cip16/For more information visit www.amulethotkey.com/products/pcoip-zero-client/cpa-certified-zero-clients or contact Amulet Hotkey http://www.amulethotkey.com/contact-us/. About Amulet HotkeyAmulet Hotkey is a proven innovator in design, manufacturing and system integration of high availability solutions for remote physical or virtual workstation, as well as virtual and cloud desktop that are optimized for both mission and business critical applications to deliver robust, secure and uncompromised performance backed up by world-class support.

Amulet Hotkey partners with leading manufacturers of data center, cloud and virtualization technologies that enable them to bring to market unique solutions tailored to enterprise IT needs for a truly flexible and scalable computing architecture.

Amulet Hotkey customers include Fortune 500 and Global 2000 enterprises as well as local and federal governments.

The Amulet Hotkey solutions are deployed in command and control, emergency call centers, investment banks, oil & gas, CAD designers, digital content creation, and post production studios around the world. Amulet Hotkey was founded in 1990, and is headquartered in the UK where design and manufacturing facilities are based with sales, support and technology centers in London and New York.

For more information see www.amulethotkey.com. Amulet Hotkey is a trademark of Amulet Hotkey Ltd., and are registered in the United Kingdom, United States and/or other countries.

Any other trademarks or registered trademarks mentioned in this release are the intellectual property of their respective owners. About TeradiciTeradici is the technology leader for creating virtual workspaces.

The company’s PCoIP technology powers the spectrum of local, remote, mobile and collaborative work styles, fundamentally simplifying how computing is provisioned, managed and used throughout virtual and cloud environments.

The world’s largest cloud computing companies rely on PCoIP technology to fulfil the promise of the cloud – an outstanding user experience, securely delivered to any device, anywhere.

Teradici customers include Fortune 500 enterprises and institutions around the world, local and federal government agencies, and cloud and service providers.

Teradici was founded in 2004, and is headquartered in British Columbia.

For more information, visit www.teradici.com. About CESGCESG is the information security arm of Government Communication Headquarters (GCHQ), and is the National Technical Authority for Information Assurance within the UK.

The CESG Commercial Product Assurance (CPA) scheme evaluates Consumer Of-the-Shelf (COTS) products and their developers against published security and development standards. Amulet Hotkey Contacts:European Editorial:Tony HilliardTel: +44 20 7960 2400tony.hilliard@amulethotkey.com US Editorial:Stu RobinsonTel: +1 212.269.9300stu.robinson@amulethotkey.com

Man arrested in Portsmouth on suspicion of cyber attacks on UK...

A man has been arrested in Portsmouth on suspicion of masterminding a £1.6m "cyber attack" on cash machines across the country. Allegedly part of an organised gang from Eastern Europe, the group targeted cash machines in Brighton, London and Liverpool by injecting a virus into the machines. The gang accessed the machines by drilling holes in them in the exact place to insert a USB stick containing the malware, dubbed Tyupkin. "An extensive, intelligence-led investigation has uncovered what we believe is an organised crime gang systematically infecting and then clearing cash machines across the UK using specially created malware," Detective Inspector Dave Strange told the Daily Mail. He continued: "Cyber-enabled crime presents a major threat to our public and private sectors and to an increasing number of citizens. The only way to tackle this is by law enforcement and counter fraud agencies working in alliance, which is exactly what the London Regional Fraud Team and National Crime Agency (NCA) have done over several months culminating in today's arrest." After the machines had been infected, the attackers were able to simply withdraw an unlimited amount of money from them at a time specified in the malware code. Kaspersky, the Russian security software company, first identified the malware that the gang used. It had been thought that the attacks used the Tyupkin malware, which only works on certain ageing cash machines running Windows, had been largely restricted to Eastern Europe. "Over the past few years, we have observed a major upswing in ATM [automated teller machine] attacks using skimming devices and malicious software. "Now we are seeing the natural evolution of this threat with cyber-criminals moving up the chain and targeting financial institutions directly. This is done by infecting ATMs themselves or launching direct APT-style attacks against banks. The Tyupkin malware is an example of the attackers taking advantage of weaknesses in the ATM infrastructure," said Vicente Diaz, principal security researcher at Kaspersky Lab's Global Research and Analysis Team.

Research reveals growing concern about fraud threat to multichannel and online...

Liverpool and London (September 22, 2014) - A new Transactis-Retail Knowledge survey of leading loss prevention professionals shows that 88% see retailers placing a greater focus on fraudulent goods lost in transit (GLIT) claims than they were two year...

Wikipedia ban edits from US Congress

Free online collaborative encyclopedia Wikipedia has imposed a ten-day block on edits from computers in US Congress building. The block is a response to anonymous changes to Wikipedia entries on politicians, businesses and historical events. The entry for the assassination of John F Kennedy was changed to say Lee Harvey Oswald was acting "on behalf of the regime of Fidel Castro", according to the BBC. The entry on the moon landing conspiracy theories was changed to say they were "promoted by the Cuban government". The rogue edits were revealed by a Twitter feed, @congressedits, which posts every change made from a US government IP address. The feed is modeled on @parliamentedits, which posts every change made by UK parliamentary computers, according to The Guardian. The twitter feed was created by journalist and coder Tom Scott after a series of news stories of embarrassing edits to Wikipedia by users of UK parliamentary computers, the paper said. Wikipedia allows any user to make changes to entries, but the changes are policed by volunteers who can remove inappropriate content and impose bans on users who flout editing rules. Wikipedia monitors have been warning editors from the House of Representatives since March 2012, and imposed a one-day block on edits from the US Congress building earlier this month. Blocks on edits from computers in the building have been imposed before following acts of vandalism. Jimmy Wales, the founder of Wikipedia, told the BBC the incident did not surprise him, and vandalism has "always gone on and it always will". Earlier this year, the BBC discovered that an edit from a UK government computer added the phrase "all Muslims are terrorists" to a Wikipedia entry about veils. The incident followed a report by the Liverpool Echo which found insults had been added by a government computer in Whitehall to the Wikipedia entry for the Hillsborough disaster. Read more on Wikipedia Wikipedia founder Jimmy Wales slams Draft Communications Data Bill Wikipedia founder campaigns against extradition of UK student Wikipedia founder Jimmy Wales helps put UK research online Jimmy Wales takes on co-chair of charitable mobile operator business The People’s Operator Wikipedia provides social model for good internet governance, says founder Wikipedia founder calls for meeting with home secretary over student’s extradition Wikipedia ordered to disclose IP address of contributor Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK

Resilience is both a technical and a business responsibility

Resilience (the capacity to recover quickly from difficulties; toughness) is a concept that is being discussed because – as was highlighted in the recent (ISC)2 Secure Liverpool conference – the technical environment organisations are embedded today in is fragile, prone to error, failure and insecure. Single-point solutions, such as backup, are not necessarily suited to the current environment, so a wider, joined-up approach is needed: resilience. Put simply, it is the ability of an organisation to keep operating during a disruption and recover afterwards. The concept embraces more than security – it touches topics such as backup and recovery, business continuity and crisis management – and looks to weave these together to allow an organisation to maintain its operational rhythm and keep delivering its services and products to its customers.  Cyber resilience covers the ability to keep operating during a detected attack or incident, to keep operating under the assumption that an undetected compromise has occurred, to operate with reduced capability or capacity, and to provide graceful degradation and recovery during and after an incident. Building resilience requires the application of standard IT and information security techniques such as backup, testing of recovery and business continuity procedures, use of hot/warm/cold sites, alternative service provisioning and incident response and management.  IT should be treated as a commodity, with easily replaceable components – “treat your servers like cattle, not pets” as a panellist stated in Liverpool – and design choices to build or purchase resilience in systems and infrastructure should be adopted. Organisations should also deliberately cause failures, as the best defence against major unexpected failures is to fail often. Frequent failures will reinforce the design, specification, purchase and build of services to be more resilient. Finally, business must be involved in testing, response, setting the minimum capability required, and stating tolerance of failure during operations. Resilience is both a technical and a business responsibility. Adrian Davis is managing director EMEA for (ISC)2 Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK This was first published in July 2014

UK operation nets 17 suspected Blackshades cyber attackers

The first-ever UK-wide cyber crime operation has netted 17 suspected users of Blackshades malware, which is designed to take over control of computers and steal information. Co-ordinated by the new National Crime Agency, the week-long operation has involved nearly every UK regional organised crime unit as well as Police Scotland and the Metropolitan Police. The UK investigation is part of global activity targeting developers and prolific users of Blackshades, a set of malware tools sold online for less than £100.  In an operation initiated by the FBI and co-ordinated in Europe through Eurojust and the European Cybercrime Centre (EC3) at Europol, police forces internationally have apprehended dozens of suspected users. The UK arrests took place in Derbyshire; Birmingham; Halesowen; Wolverhampton; Newcastle-under-Lyme; Brixham, Devon; Andover, Hampshire; Ashford, Kent; Liverpool; Manchester; Warrington; London; St Andrews; Glasgow; and Leeds. Further arrests took place in the Netherlands, Belgium, Finland, Austria, Estonia, Denmark, Canada, Chile, Croatia and Italy, taking the total number of arrests in connection with Blackshades to 97. The most common Blackshades product is a remote access tool (RAT), which enables cyber criminals to remotely take over and control the operations of an infected computer. The malware can be used to perform various actions, including taking screenshots and accessing files and documents. It can also be used to hijack computers and use them as part of botnets to carry out distributed denial of service (DDoS) attacks. Blackshades is also designed to infect USB devices to aid further spreading of malware and infect other computers via peer-to-peer communications. However, typical infections are spread through malicious links planted on social networking platforms. A password recovery application within the malware is designed to capture usernames and passwords, enabling the criminal to view the stolen data in a similar way to an email inbox. Investigators believe that about 200,000 usernames and passwords of victims across the world may have been extracted by Blackshades users in the UK. Andy Archibald, deputy director of the NCA’s National Cyber Crime Unit (NCCU), said criminals throughout the UK and across the world are finding that remote crime is no protection from arrest. “The unique scale of this cyber operation shows what can happen when law enforcement agencies at local, national and international level work together,” he said. Archibald said cyber crime is one of the most significant criminal threats to the UK and the NCA is helping to build the capacity of its partners across the country and co-ordinating the UK’s collective efforts. “The commitment of our police partners in the cyber arena has been clearly demonstrated by the work culminating in this week’s dramatic activity,” he said. National Policing lead on e-crime, Deputy Chief Constable Peter Goodman, described the operation as a “superbly co-ordinated, intelligence-led” international policing response to the cyber crime threat. “It demonstrates the determination of the NCA, its partners overseas and the UK’s newly-established regional cyber crime units to identify, trace and disrupt those whose potential criminal activity presents a threat to the public’s lawful use of the intranet,” he said. Goodman said the operation also demonstrates that law enforcement has the technology, capability and expertise to track criminals down. “It should also reassure the public that the police can and will respond effectively to the reports we receive about the criminal use of computer networks and malware to bypass security measures we rely on to keep our personal data safe,” he said. In addition to the arrests, the NCA is warning individuals who have downloaded the malware, but have not yet deployed it, that they are now known to the agency. The NCA has urged members of the public to keep antivirus software updated regularly, and to back up their computer and other electronic devices to ensure they can recover files, including important documents and photographs. Further advice on internet safety can be found at Get Safe Online or through the Cyber Streetwise awareness campaign.                                                         Anyone who believes they have lost money through malware should report it through the national Action Fraud website. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK

Uh-oh, this computer virus can spread via Wi-Fi

Researchers at England's University of Liverpool have created Chameleon, a virus that can proliferate via Wi-Fi as efficiently as the common cold infects humans. February 27, 2014 12:54 PM PST (Credit: University of Liverpool) British researchers h...

Internet of things: Low-cost trade-off

The office at DoES Liverpool has a DoorBot, which works as a kiosk device, showing webcam views of the office and a list of upcoming events. Doorbot originally consisted of a networked PC with a flat-screen monitor facing out towards the corridor through a conveniently located window.

The DoorBot works as a kiosk device, showing webcam views of the office, a list of upcoming events (from Google Calendar), and a welcome message to any expected guests. Currently, its only input device is an RFID reader. Our members can register their RFID cards (Oyster, Walrus, DoES membership card, and so on). Finally, this device is also connected to speakers, so it can play a personalised tune or message when members check in or out. Developing this device was as simple as running software on a computer ever is: the trickiest cases are things such as turning the screen off and on after office hours and coping with losing or regaining power and network. Given how close the functionality is to that of a PC, it might seem crazy to think of any other solution. However, if we had to scale up – to cover more doors or to sell the idea to other companies – we suddenly have new trade-offs. Just sticking a tower PC somewhere near the door may not be ideal for every office.

A computer that fits neatly with an integrated screen might work, such as an iMac, a laptop, or a tablet. But these devices are much more expensive than the original commodity PC (effectively “free” when it was a one-off because it was lying around with nothing else to do).

A small embedded computer, such as a Raspberry Pi, might be ideal because it costs relatively little, runs Linux and has HDMI output. Read more about the internet of things >> This is an edited extract from Designing the Internet of Things by Adrian McEwen and Hakim Cassimally, published by Wiley, RRP £19.99. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners.

If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com This was first published in December 2013