Microsoft Advanced Threat Analytics

Did you know that attackers reside within a network for an average of 8 months before they’re detected? Me neither. With Microsoft Advanced Threat analytics, you can reduce your risk of costly damage and get all the concise information and real-time view of the attack timeline. With built-in intelligence to learn, analyse and identify normal […]

The WannaCry Cyber Attacks- A Week On

As I’m sure some of you are aware, just over a week ago, the UK and many other countries suffered a Ransomware attack that coated the nation in chaos. It will go down in history as one of the world’s worst cyber-attacks, successfully reaching over 230,000 machines in over 150 countries worldwide. If you want to […]

How to Avoid an Online Scam

With the recent influx of emails of spam emails appearing to come from legitimate companies, it is no wonder that cybercrime is at an all-time high. Throughout 2016 and moving swiftly into 2017, payment requests and fake invoice emails, appearing to come from well-respected organisations like PayPal and Apple are flooding our inboxes. These emails […]

A Brief Guide To Spam

Everyone and their grandmother suffers spam. If you’re smart you can minimise the amount of cheap Rolexes and little blue pills that you get offered on a daily basis, but it’s always a problem. In fact, nearly 80% of all the emails the average person receives are spam. So why, in an age where we […]

What to do if your website is hacked

  Nothing can seem more detrimental than having your website hacked. Hackers are usually motivated by financial means and there are two ways in which they may compromise your website: Spam Malware The first way means hackers will fill your website with spammy text and links to their website. Instead of putting the hard work in to […]

The One-page Business Security Audit

  We live in an increasingly networked world, from personal banking to business management to government infrastructure. Protecting those networks is no longer optional. If you’re like any of Lucidica’s crème de la crème a.k.a our clever and helpful engineers who know the ins and outs of IT, you may find significance in the infographic […]

How to Remove Ransomware

What is Ransomware? Ransomware is defined as; “a type of malicious software designed to block access to a computer system until a sum of money is paid.” Basically, it is the horrific procedure of logging into your computer and being greeted with a red image which demands large sums of money in exchange for your […]

Cookies, In a Nutshell.

Cookies You’ve probably seen these pop up before. Most sites nowadays use cookies and unless you say otherwise, will take your continued browsing as consent to their use of cookies. I’m guilty of agreeing to every ‘terms and conditions’ just to avoid any delays or restrictions to purchasing an item. But what exactly am I […]

WhatsApp Your Security

Do you remember way back in 2014 when Facebook bought WhatsApp for £13.7 million and promised not to share our details? Yep, they decided against that. In the last few weeks, WhatsApp has changed their terms and privacy policy for the first time since the deal. By agreeing to the updated terms, your information will […]

The Rise Of Cybercrime

  According to new research by recruitment finance provider, Sonovate, IT security professionals are currently the most sought-after workers in the UK’s growing jobs market. The growth for such roles has reached 19 per cent – a new year-on-year high and is expected to reach 30 percent over the course of 2016. Richard Prime, co-CEO […]

Trademark Scams

How to Recognise Trademark Scams? Earlier this month we received three letters from an organisation called ‘Patent and Trademark Institute.’ The letters made every effort to appear to be trademark invoices. Each requested around £800 to prevent the ‘brand/patent record’ from being ‘deleted’. They were passed onto our CTO Thomas Jeff’s who noticed some red flags. First, […]

Terms of Service; Didn’t Read

Always wanted to read a website’s terms of service? Me neither. Latest research reveals just 7% of Britons read terms of service before clicking the phrase ‘I have read and agreed to the terms’ which would make it the biggest lie on the internet closely followed by ‘it’s complicated.’ You can be forgiven for thinking little of […]

Ads vs Crowdfunding

With over 2 billion people connected, the internet has the potential to provide everyone with audience. Whether it’s for content such as YouTube videos and blogs or the services which host them, more than ever digital projects have the possibility of being seen or used by millions of people. As the world is turning to […]

Who Writes Wikipedia?

Ask the world’s biggest encyclopedia who its author is and it will proudly inform you: you are. But do you edit? We don’t, at least not regularly.. so who actually edits Wikipeda? And whilst we’re on the subject, how does the internet’s one-stop shop for knowledge actually work? As it turns out, Wikipedia’s community is […]

Superfish Scandal: Tips to Remove Spyware

Lenovo’s brand is badly damaged after it was revealed that it had pre-installed software called Superfish on some of its computers. Although Superfish itself is not necessarily a problem, the third-party software it used replaced encryption codes on shopping websites with its own easily-hacked code making users vulnerable to spying and theft of their personal […]

5G Mobile Broadband by 2018?

Like millions of people worldwide, we’re still impressed with just how fast our shiny new 4G phones can serve us all the YouTube videos we could possibly watch (before our data cap kicks in). In central London, some of our engineers even get faster mobile speeds than their home broadband! The thing with technology is […]

Stay safe with iCloud

You’ve probably heard by now that some celebrity photos were allegedly stolen from Apple’s iCloud by a hacker. It was reported that the hacker(s) found a vulnerability with iCloud and was able to hack into it and steal pictures that some celebrities had knowingly or unknowingly backed-up. Apple confirmed it found no security breach but […]

No More Open Internet?

The internet has always been a platform where everybody can share data freely. There is (at least in the western world) no censorship, there is nothing to hold people back from expressing themselves. But recently the idea of ending ‘net neutrality’ (where every bit of data is treated equally by internet service providers (ISP)) is […]

What is Bitcoin?

Bitcoin. It sounds like something you use to buy extra tools for your Farmville game, but if you’ve been reading the news recently, some pretty major players are starting to talk about it. But what exactly is Bitcoin and why should you care? With banks struggling to keep afloat and entire countries withholding citizens’ funds, […]

The Problem With Passwords

Those of you that subscribe to the Lucidica newsletter may have noticed that in October we mentioned that mobile application developer SplashData released their annual list of the most common, and therefore worst passwords on the internet. ‘password’ and ‘123456’ are obviously the most popular, but less obvious words, like ‘monkey’, are gaining increasing usage. […]

Yahoo! to be sold to private buyers?

News has been released that co-founder and former CEO, Jerry Yang wants to sell Yahoo! to private buyers. Since firing Carol Bartz in September, Yahoo! have been working on a “strategic review” with advisers Allen & Co and Goldman Sachs. (I’m assuming this means selling some of the company and their assets). A few possible suitors […]