Contact Us

Cyber Awareness

featured image for the blog post

How to check if you’ve been hacked by Pegasus

Pegasus Project is now one of the biggest scandals, with tens of thousands of government officials and journalists being hacked and surveilled by their own governments, and other countries using malware and spyware developed by NSO group; a ‘Cyber Intelligence’ company based in Israel.

Mobile App Security

When developing a mobile app it is important to implement security from the outset. Future additions or alterations may not be cost-effective and can dramatically increase the risk of users having their data stolen. Mobile security is one of the most overlooked parts of cyber security and many applications are built with no considerations about … Read More

Signing Your Life Away?

Have you been signing your life away? Remember those Terms and Conditions that nobody ever read? You know, the ones that we always used to see when we were downloading an app or signing up to subscribe to something? Sure, you do!

Corporate Hacking Surges

Corporate hacking surges are becoming more frequent. Work-from-home policies have contributed to a large surge in hacking against corporations. Many staff have made the transition to working from their homes amidst the global covid-19 pandemic. As a result we are seeing malicious activity more than double in many countries.

Tools for penetration testing

We all know that skilled hackers are only as good as the tools they use – whether they are self-made or widely available to download, professionals rely on tools to speed up tests and complete tasks which would otherwise not be humanly possible (such as exploit’s with race conditions, for example). So, here they are; Sencode Cyber Security’s top 5 hacking tools as of February 2021.

People Are The Weakest Link, But Why?

In the context of cyber security, it is often said that people are the weakest link in any business-critical system. It is well documented that the human element will always be more vulnerable than the technological components of a business. But why is this?