<h1 class="entry-title">Month: June 2015</h1>

Help Us Fight Fakes, Alibaba’s Security Chief Tells Global Brands

When it comes to fighting fakes, Alibaba’s head of internet security says cooperation beats the courtroom any day. Ni Liang, who runs the Hangzhou, China-based company’s anti-counterfeiting operations, was speaking to Reuters days after Gucci, Yves Saint Laurent and other luxury brands owned by Paris-based Kering SA sued Alibaba in New York, alleging the e-commerce […]

Launch: Islamic Curriculum on Peace & Counter-Terrorism

At least 700 British people are thought to have travelled to the Middle East to join jihadist organisations, and the influence of extremism in the UK has become a growing concern. A new curriculum is being launched to help tackle the radicalisation of young Muslims. Pakistani politician and Islamic scholar Dr Muhammad Tahir-ul-Qadri hopes the […]

UK Leads the Way with £15.8m Seizure of Counterfeit and Unlicensed Medicines and Devices

MHRA announced £15.8 million worth of counterfeit and unlicensed medicines and devices have been seized in the UK. The Medicines and Healthcare products Regulatory Agency (MHRA) today (18 June) announced £15.8 million worth of counterfeit and unlicensed medicines and devices have been seized in the UK as part of a global operation. The seizures – […]

Alert: Scammers are Changing Tactics to Commit Courier Fraud

The National Fraud Intelligence Bureau’s (NFIB) proactive intelligence team is warning people about a new variation of courier fraud involving Foreign Exchange Bureaus. As with traditional types of courier fraud, the victim receives a phone call and they are told that they’re speaking to a police officer and that the police want them to assist […]

Five Steps to Protect Your Business from Cyber Attack

A cyber attack is unauthorised access to your IT network by an outsider.   This is commonly done with malware (malicious software), unwittingly downloaded through spam emails, intentionally downloaded software or harmful websites. They run on your computer, sometimes relaying everything you type to hackers. Other methods include accessing your network through poorly protected Wi-Fi networks, […]