[{"id":2194,"link":"https:\/\/cybersecurityplus.co.uk\/how-to-spot-scams-like-i-regret-to-inform-you-about-some-sad-news-for-you-scam\/","name":"how-to-spot-scams-like-i-regret-to-inform-you-about-some-sad-news-for-you-scam","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2024\/02\/kisspng-lottery-scam-con-artist-advance-fee-scam-portable-automotive-consulting-amp-omologazione-auto-moto-5b6df6a651af92.08554486153393322233461.jpg","alt":""},"title":"How to spot scams like I Regret To Inform You About Some Sad News For You scam","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Feb 27, 2024","dateGMT":"2024-02-27 11:00:31","modifiedDate":"2024-02-27 11:00:33","modifiedDateGMT":"2024-02-27 11:00:33","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":58},"status":"publish","excerpt":""},{"id":2185,"link":"https:\/\/cybersecurityplus.co.uk\/your-mac-is-not-virus-proof-it-never-has-been\/","name":"your-mac-is-not-virus-proof-it-never-has-been","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2024\/02\/2213c2b9ba6248f8f743465bdd789d571.jpg","alt":""},"title":"Your Mac Is Not Virus Proof. It Never Has Been.","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Feb 15, 2024","dateGMT":"2024-02-15 07:02:19","modifiedDate":"2024-02-15 07:12:07","modifiedDateGMT":"2024-02-15 07:12:07","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/cyber-crime\/\" rel=\"category tag\">Cyber Crime<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/cyber-crime\/\" rel=\"category tag\">Cyber Crime<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":6},"status":"publish","excerpt":""},{"id":2163,"link":"https:\/\/cybersecurityplus.co.uk\/hackers-can-now-bypass-two-factor-authentication-with-a-new-kind-of-phishing-scam\/","name":"hackers-can-now-bypass-two-factor-authentication-with-a-new-kind-of-phishing-scam","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2023\/06\/RD-Two-Factor-Authentication-FT1.jpg","alt":""},"title":"Hackers Can Now Bypass Two-Factor Authentication With a New Kind of Phishing Scam","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Jun 24, 2023","dateGMT":"2023-06-24 05:51:27","modifiedDate":"2023-09-11 16:13:22","modifiedDateGMT":"2023-09-11 16:13:22","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":24},"status":"publish","excerpt":""},{"id":2117,"link":"https:\/\/cybersecurityplus.co.uk\/why-you-should-setup-parental-control-on-your-home-network\/","name":"why-you-should-setup-parental-control-on-your-home-network","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2023\/06\/bigstock-parental-control-403355051.jpg","alt":""},"title":"Why You Should Setup Parental Control On Your Home Network","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Jun 15, 2023","dateGMT":"2023-06-15 09:26:31","modifiedDate":"2023-09-11 16:13:22","modifiedDateGMT":"2023-09-11 16:13:22","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/cyber-crime\/\" rel=\"category tag\">Cyber Crime<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/cyber-crime\/\" rel=\"category tag\">Cyber Crime<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":41},"status":"publish","excerpt":"Your home WiFi network is only as safe as you make it. But that can feel like a lot of work.\u00a0 \u00a0In this article we are focusing on why parental controls should be included in your home network security setup."},{"id":2037,"link":"https:\/\/cybersecurityplus.co.uk\/uk-firms-most-likely-to-pay-ransomware-hackers\/","name":"uk-firms-most-likely-to-pay-ransomware-hackers","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2023\/06\/pad-lock.jpg","alt":""},"title":"UK firms most likely to pay ransomware hackers","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Jun 9, 2023","dateGMT":"2023-06-09 12:34:06","modifiedDate":"2023-09-11 16:13:23","modifiedDateGMT":"2023-09-11 16:13:23","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":13},"status":"publish","excerpt":"Some 82% of British firms which have been victims of ransomware attacks paid the hackers in order to get back their data, a new report suggests."},{"id":2032,"link":"https:\/\/cybersecurityplus.co.uk\/moveit-hack-what-action-can-data-breach-victims-take\/","name":"moveit-hack-what-action-can-data-breach-victims-take","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2023\/06\/ransom-dont-pay.jpg","alt":""},"title":"MoveIt hack: What action can data-breach victims take?","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Jun 9, 2023","dateGMT":"2023-06-09 12:27:03","modifiedDate":"2023-09-11 16:13:23","modifiedDateGMT":"2023-09-11 16:13:23","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/cyber-crime\/\" rel=\"category tag\">Cyber Crime<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/cyber-crime\/\" rel=\"category tag\">Cyber Crime<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":4},"status":"publish","excerpt":"More than 100,000 people have been warned their personal data is in the hands of cyber-criminals as a result of a continuing mass hack."},{"id":348,"link":"https:\/\/cybersecurityplus.co.uk\/bbc-ba-and-boots-issued-with-ultimatum-by-cyber-gang-clop\/","name":"bbc-ba-and-boots-issued-with-ultimatum-by-cyber-gang-clop","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2023\/06\/bbc-ba-boots-hack.jpg","alt":""},"title":"BBC, BA and Boots issued with ultimatum by cyber gang Clop","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Jun 8, 2023","dateGMT":"2023-06-08 14:32:00","modifiedDate":"2023-09-11 16:13:23","modifiedDateGMT":"2023-09-11 16:13:23","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/security\/\" rel=\"category tag\">Security<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cybersecurityplus.co.uk\/tag\/blockchain\/' rel='post_tag'>Blockchain<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/cyber-security\/' rel='post_tag'>Cyber Security<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/cybercrime\/' rel='post_tag'>Cybercrime<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/global-news\/' rel='post_tag'>Global News<\/a>"},"readTime":{"min":3,"sec":28},"status":"publish","excerpt":"A prolific cyber crime gang thought to be based in Russia has issued an ultimatum to victims of a hack that has hit organisations around the world."},{"id":776,"link":"https:\/\/cybersecurityplus.co.uk\/abb-confirms-it-security-incident-impacting-operations\/","name":"abb-confirms-it-security-incident-impacting-operations","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2022\/01\/news-8.jpg","alt":""},"title":"ABB confirms IT security incident impacting operations","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"May 1, 2023","dateGMT":"2023-05-01 10:01:36","modifiedDate":"2023-09-11 16:13:24","modifiedDateGMT":"2023-09-11 16:13:24","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/blockchain\/\" rel=\"category tag\">Blockchain<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/blockchain\/\" rel=\"category tag\">Blockchain<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":55},"status":"publish","excerpt":""},{"id":127,"link":"https:\/\/cybersecurityplus.co.uk\/wi-fi-users-warned-over-signs-youre-already-a-victim\/","name":"wi-fi-users-warned-over-signs-youre-already-a-victim","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2020\/07\/midsection-businessman-using-phone-desk-7421265091-scaled.jpg","alt":""},"title":"Wi-Fi users warned over signs you\u2019re already a victim","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Mar 19, 2023","dateGMT":"2023-03-19 16:52:00","modifiedDate":"2023-09-11 16:13:24","modifiedDateGMT":"2023-09-11 16:13:24","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/blockchain\/\" rel=\"category tag\">Blockchain<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/blockchain\/\" rel=\"category tag\">Blockchain<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cybersecurityplus.co.uk\/tag\/blockchain\/' rel='post_tag'>Blockchain<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/cyber-security\/' rel='post_tag'>Cyber Security<\/a>"},"readTime":{"min":3,"sec":5},"status":"publish","excerpt":"Hackers who get a hold of and use your wi-fi connection could take complete control over your computer,\u201d\n\u201cThey\u2019ll then transfer your data to themselves for future use or sell it on the dark web to the highest bidder"},{"id":773,"link":"https:\/\/cybersecurityplus.co.uk\/new-flaw-in-wordpress-plugin-used-by-over-a-million-sites-under-active-exploitation\/","name":"new-flaw-in-wordpress-plugin-used-by-over-a-million-sites-under-active-exploitation","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2022\/01\/news-7.jpg","alt":""},"title":"WordPress Plugin Used by Over a Million Sites Exploited","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Nov 1, 2020","dateGMT":"2020-11-01 10:00:32","modifiedDate":"2023-09-11 16:13:24","modifiedDateGMT":"2023-09-11 16:13:24","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":42},"status":"publish","excerpt":""},{"id":125,"link":"https:\/\/cybersecurityplus.co.uk\/how-schools-can-protect-against-cyber-attacks\/","name":"how-schools-can-protect-against-cyber-attacks","thumbnail":{"url":"https:\/\/cybersecurityplus.co.uk\/wp-content\/uploads\/2020\/07\/system-hacked.jpg","alt":""},"title":"How schools can protect against cyber attacks","author":{"name":"tonibennett","link":"https:\/\/cybersecurityplus.co.uk\/author\/tonibennett\/"},"date":"Jul 19, 2020","dateGMT":"2020-07-19 16:51:25","modifiedDate":"2023-09-11 16:13:25","modifiedDateGMT":"2023-09-11 16:13:25","commentCount":"0","commentStatus":"closed","categories":{"coma":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/blockchain\/\" rel=\"category tag\">Blockchain<\/a>, <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>","space":"<a href=\"https:\/\/cybersecurityplus.co.uk\/category\/blockchain\/\" rel=\"category tag\">Blockchain<\/a> <a href=\"https:\/\/cybersecurityplus.co.uk\/category\/hacker\/\" rel=\"category tag\">Hacker<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/cybersecurityplus.co.uk\/tag\/blockchain\/' rel='post_tag'>Blockchain<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/cyber-security\/' rel='post_tag'>Cyber Security<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/cybercrime\/' rel='post_tag'>Cybercrime<\/a><a href='https:\/\/cybersecurityplus.co.uk\/tag\/global-news\/' rel='post_tag'>Global News<\/a>"},"readTime":{"min":3,"sec":26},"status":"publish","excerpt":"Cyber security in the education sector has become an increasingly pressing concern in recent years as hackers target the sensitive data of students, teachers and staff"}]