How statistics-based attacks work

Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...

How do signature-based attacks work?

Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based...

How do firewalls work?

Firewalls are something we take for granted, but as we've seen from some recent high profile security breaches, even the best firewalls are...

Lost in Translation: Different approaches to personal data

This week Intercity held a Cyber Security event in Birmingham as part of Intercity's drive to promote awareness with our customers and encourage them...

The race for our attention - What do we really want to do in our lives?

The best way to get someone's attention is to know how their mind works. If you have teenage children, you may be aware of Snapchat Streak, which...

How can businesses prepare for IT disaster?

The type of IT disaster which concerns our customers isn’t courtesy of Mother Nature, their own health, unanticipated accidents or technology failure...