It used to be a bit of chore trying to set up your computer so you could remotely access it. However, as the world hurtles towards mobile computing the task has become much easier. For instance, at the centre of Microsoft’s new operating system Windows 10 are easy-to-use tools designed to enable you to remotely hook up your smartphone whether it’s a Windows phone, Android or iOS phone to a desktop PC. Traditional methods, such as third-party software, also are still extremely useful while if you’re running a small business and want absolutely watertight connections to several computers virtual private networks are still the way to go.
The latest news from the world of cyber skulduggery from LinkedIn passwords for sale, the re-emergence of ATM malware, fears in the US about banking and shopping online and even real live pirates swinging from the rigging to descend on precious cargo identified by hacking a shipping company’s systems. You can also learn how to simply set a password that takes hundreds of years to crack. There’s a bit more too.
As the number of cyber-crimes seems to rise steadily year-on-year, the methods hackers use remain surprisingly consistent. Sometime there is a spike in a particular type of malware favoured by cyber-thieves but ‘tried-and-tested’ techniques such as phishing and exploiting web site vulnerabilities are still popular. It’s just that hackers are getting better at using them, which of course doesn’t bode well for the unprotected.
The sale of exploit kits on the dark web is surging as organised crime entrenches itself in the digital underground. Interpol’s hands are tied as government responses are hampered over concerns about citizen’s digital freedoms.
With many people using online banking as a preferred means of managing finances it’s absolutely vital that you know how to protect yourself from hackers, scammers and fraudsters keen to exploit vulnerabilities and a lack of awareness. Read on for protection tips.
Choosing a laptop that dovetails with your needs can feel like a confusing process. There are so many models available, in a very wide price range, with specifications that can appear impenetrable and little short of gobbledygook. To simplify the process we’ve outlined the key things you need to consider and why.
A few years ago 50 billion apps had been downloaded from the Android Google Play store. It’s a bewilderingly high number and one that illustrates just how popular, and useful, apps have become. But finding the apps that you find practical can be quite an exercise. That’s why we’ve listed 15 of the most useful Android apps you can use from cloud storage to password storage and offline maps.
Everything on the Bitcoin mining malware front has been quiet for a while – until now. A trojan has been discovered which targets Windows users. If you’ve got Bitcoins, read all about it here and find out what you need to do to stay safe.
In the third and final blog on Windows 10 we look at its security features. There have been some significant developments but it’s not all sunshine and roses – there are still some things you need to be mindful of and you still need good antivirus software because Microsoft’s version doesn’t quite cut it and could leave you dangerously exposed.
Windows 10 has been available for some time and it’s likely that many of us will be using it at some point down the line. In this, the second in our Windows 10 blog series, we look at some of the most prominent features in the operating system to give you a head’s up when you do eventually use it, if you’re not doing so already.