All posts

Ransomware Protection Tested

Red screens means red faces. Prevent, don’t pay!

Ransomware Protection Tested

Ransomware is causing all the rage right now. That’s why we’ve tested products that offer protection from ransomware.

It’s the type of threat that gets attention because a successful attack is extremely visible (the attacker needs you to know it’s worked, or you won’t pay!) Also, there is a direct and substantial cost attached to it. In addition to paying security specialists to help, there’s a fat ransom demand sitting on your screen.

Ransomware isn’t subtle

While much hacking is subtle, stealing information silently, ransomware is in your face. It stops businesses in their tracks. It gets the attention of the finance directors. It provides powerful ammunition to security teams arguing for more resources. And, of course, it makes headlines.

Continue reading “Ransomware Protection Tested”
All posts

Email ransom attack without the malware

Do You Do Any of These Embarrassing Things?

Email ransom attack

Email ransom attacks are easy and common. It’s like ransomware, but without the clever coding. Not every hacking attack has to be sophisticated. Sometimes hackers simply demand money, with the threat of making life worse if you don’t pay.

Your Device Was Hacked

The following is an example of a non-targeted, completely opportunistic email ransom attack that threatens to expose embarrassing personal details. A ransom of $1,650 will ensure the details stay private.

Continue reading “Email ransom attack without the malware”
All posts

How to research mobile app security

Advice says, “research the app.” But where do you start with mobile app security?

mobile app security

Most people want to keep their mobile devices secure. But how do you know the mobile app you are going to install is safe? You can’t trust the app stores. Most Android malware comes from Google’s Play Store. The good news is there are loads of articles giving advice on how to do so. Almost inevitably, one piece of advice will be, “research the app” or “research the company”. The advice is true, because you should check things like that. But rarely does the advice go into detail, because it’s hard to research mobile app security properly! We’ll show you how.

Research the app in 6 easy(ish) steps

Researching a mobile app before you install it is important. There are plenty of fake apps out there and, possibly even worse, some that work but also include unwelcome ‘things’. These ‘things’ could be intrusive ads, extensive tracking of your behaviour or even malware.

Continue reading “How to research mobile app security”
All posts

Endpoint protection needs your attention

How to get out more than you put in

Endpoint protection needs your attention

Technology gives us tools to achieve sometimes amazing things. But no matter how advanced, it usually requires humans to make an effort.

We’ve all heard the terms, “fire and forget” or “plug and play” but these are usually marketing dreams. In security, as with any other area, you can buy tools, but you need to understand how to use them if you are going to succeed.

Continue reading “Endpoint protection needs your attention”
All posts

Outdated law firm tech creates tension with clients

Legal firms vs. data security: How to solve the tension between lawyers, their IT teams, clients and data security

outdated law firm tech

Traditional ways of working in the legal world clash with modern technology and tech-savvy clients. Outdated law firm tech might be safe, but it makes customers unhappy.

There is a tension between lawyers, their IT teams and their clients. Law firms don’t like to recognise this, at least publicly. But there is a clash between “the way things are done”, customer service and the convenience provided by modern technology.

Continue reading “Outdated law firm tech creates tension with clients”
All posts

Cyber Security DE:CODED Series One

Binge on all episodes of Cyber Security DE:CODED, Series One.

Find all of the episodes from the award-winning Cyber Security DE:CODED Series One in one handy place.

Continue reading “Cyber Security DE:CODED Series One”
All posts

SE Labs information feeds you can use for free

Follow us like it’s 1999

SE Labs information feeds

We have RSS feeds that let you automatically track our security test reports, our blog posts and our newsletters. Use these SE Labs information feeds to stay in touch.

Aggregate and automate

Whether you just like seeing all of your security news in one place, or need to pull information into one place for automation, our RSS feeds will help.

Continue reading “SE Labs information feeds you can use for free”
All posts

European Cybersecurity Blogger Awards 2021

Please nominate us! You did it! Update: And we did it!

European Cybersecurity Blogger Awards 2021

The European Cybersecurity Blogger Awards is here again! It recognises the best computer security blogs – the sites you use to keep up to date with what’s going on in the cyber security world.

It’s not too late It is now!

Thanks for nominating us. We’re listed in four of the nine categories thanks to you! These are:

  • Best Technical Content
  • Best Corporate Blog
  • Up & Coming Podcast – WE WON!
  • Best Podcast

The winners were announced on the 9th June 2021. Updates are available at the official website.

Continue reading “European Cybersecurity Blogger Awards 2021”
All posts

Cyber Security DE:CODED – 9 Hollywood Hacker Movies Rated

“How do we make looking at a black screen with code interesting?”

Show notes for series 1, episode 8

How realistic are hacking scenes in Hollywood movies? Security expert Simon Edwards analyses scenes from nine of the most well-known films about computer hacking.

Continue reading “Cyber Security DE:CODED – 9 Hollywood Hacker Movies Rated”
All posts

How they sell security (and we buy it)

The world of cyber security sales is unclear at best

The secret world of cyber security sales is fascinating. And shady. If you ever wondered how they sell security, and how we buy it, we have a treat for you.

Our security reports help you choose the best anti-malware solutions for your organisation and your family. These latest lab results look at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).

Continue reading “How they sell security (and we buy it)”

Contact us

Give us a few details about yourself and describe your inquiry. We will get back to you as soon as possible.

Get in touch

Feel free to reach out to us with any questions or inquiries

info@selabs.uk Connect with us Find us