Clutch Names SPG Dev Centres as Top B2B Providers

Software Planet Group are delighted to announce that our Ukrainian-based development centres have jointly been selected by Clutch as one of the top B2B providers in the country. This was based on customer feedback, market presence, quality of work and services.

As a company dedicated to a lasting partnership approach, we are honoured to have our efforts recognised by such a client-centric platform. In fact, it is only thanks to the input of our own faithful customers that over the years, Clutch’s review-based website has been able to send many a client our way — and for that, we are abundantly grateful.

Read More


Meltdown and Spectre: How Everyone Is Affected

Although it may have been dubbed the “worst bug ever,” for many years, the mechanism behind security vulnerabilities Meltdown and Spectre was widely regarded as a cornerstone of modern processor design.

It was only at the turn of the year that talk of a serious threat to cybersecurity began making the online rounds. Without any substantial evidence, the subject was cautiously treated as a rumour, but after days of intensifying speculation, Intel were forced to finally come clean.

And so, in an astounding January 3 statement, the chip giant finally admitted that critical security flaws are indeed present in most modern-day processors, including ARM and AMD. Essentially, this conceded that no one is immune to the danger, as it affects virtually all personal computers, cloud servers, and mobile phones as well.

Read More


Plan & Prevent: The Secret to Overcoming a Ransomware Attack

Last May, we watched in bewilderment as our already crippled NHS was dealt yet another blow — an unprecedented cyber attack was causing chaos and disruption in one in five NHS trusts across England, and we had barely heard the half of it. As the story continued to unfold, newscasters relayed that the attack had been a global phenomenon, quickly spreading to 150 countries and infecting over 230,000 computers.

The guilty party was a malicious program known as WannaCry, ransomware designed specifically to exploit an old Windows vulnerability in order to lock systems, encrypt files and demand $300 (£232) in exchange for a decryption key. While many were warned not to pay the ransom, as there was no guarantee of ever recovering one’s data, the cybercrooks reportedly earned £55,000 in more than 260 Bitcoin transactions.

With such alarming figures, it is not difficult to see why so many hackers have turned to ransomware as a convenient and lucrative form of criminal behaviour. Ironically, however, standard security procedures are also responsible for the increasing danger. Because IT specialists keep open databases listing all known recent threats, cybercriminals are able to use this information to target system weaknesses. To make matters worse, most companies fail to install security patches as soon as they become available, leaving the door wide open for further attacks.

Read More