How statistics-based attacks work

Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...

iOS vs Android - The mobile security wars

We all have our own preference. Whether you’re a loyal Apple customer, or you’ve never been tempted to put distance between your thumbs and your...

How do signature-based attacks work?

Recently, whilst delving under the bonnet to find out what firewalls really do I came across the unforgettably-named Ping of Death signature-based...

Building a bigger and better Birmingham

Why Intercity is committed to investing in the Midlands Business Engine

Birmingham is a centre for innovation. With a population of over 10 million...

How do firewalls work?

Firewalls are something we take for granted, but as we've seen from some recent high profile security breaches, even the best firewalls are...

What is IT as a Service (ITaas) and why does it matter?

We’re part of a generation that prefers to rent than buy. This behaviour extends past the way we behave as consumers, into our working lives....