Call us on: 02920 887 362
Insights /

The top emerging cyber threats of 2019 you’ve probably never heard of…

With the ever-changing cyber landscape, it’s important to be up to date with the new and emerging cyber threats. Especially the ones that go under the radar…

That’s why we thought we would do a quick roundup of some of the more alternative and new-age types of cyber threats that have affected some parts of the world.


Deepfake – Hearing is believing…

The rise of Deepfake over 2019 has been meteoric.

Initially being used for comedic purposes like Donald Trump videos…

Deepfake is a technique for human image synthesis based on Artificial Intelligence.

In short, it is an exercise that maps the natural movements of a human’s face and superimposes other humans to replace the original appearance.

In 2018 FakeApp was launched and made available worldwide. This gave users the ability to create their own Deepfake videos. This has resulted in celebrity videos, revenge porn, and multiple fake news instances.

However, the latest development is that Deepfake has developed audio capabilities. With recent reports revealing that employees have been deceived by hackers using this technology.

An article by Security Intelligence has discussed how Deepfakes audio technology could be a real threat to businesses and their cybersecurity.

The Sweet Sound of Typing

New security research this year has revealed that smartphone passwords could be hacked just from the sound of typing.


Apparently, the detection could be completed in a matter of seconds. With it claimed that it can be carried out in a loud and crowded area.

So how is it done?

Users who allow apps access to control a mobile’s microphone and Bluetooth are the main culprits. Incredibly, smartphones can pick up sound waves produced from a user typing on their computer keyboard.

The acoustic signals would then be analysed to decipher which keys are struck and in which order. To figure out the user’s password.

Research by Southern Methodist University in Texas revealed that they were able to work out correct passwords at a rate of 41%. A rate which they claim would improve when cross-referenced the most commonly used passwords.

What should you do? Evaluate which apps have access to your camera, microphone, and Bluetooth.

Having a Mobile is Infectious!

Mobile phones are often a prime target for hackers, as users’ devices can often hold a lot of information related to the business they work for.

However, one of the biggest issues is users not updating and keeping protection secure on business devices. The general perception among business owners is that cybersecurity only extends to the PC’s and laptops the organization uses, this is wrong.

Not updating operating systems on mobile phones leaves a big hole in your cybersecurity. With the rise of IoT devices, it now more important than ever to make sure devices are on the latest firmware available. This will ensure your security is up to date and protecting any personal or sensitive data the device might hold.

Without regular updates, any anti-malware protection installed on the devices could become redundant.

Next steps?

If you would like to keep up to date with our latest news and advice, make sure you subscribe to our mailing list.

Alternatively, if you are after some business advice in regards to IT service, please give us a call on 02920 887 362 or send us an email us at

You might also be interested in:

A Quick Intro to Patching

What is patching? And why do IT people talk about it so much?

When should you outsource your IT?

The short answer, and the one you’d expect from an IT support provider, is as soon as you can. But there’s a bit more to it than that.

Excellence on Ice