Have you seen what you look like online?

data privacy day

Everything we post online is forever present in cyberspace. Emails, updates, messages – even those old photos and videos that make us cringe are stored somewhere in the World Wide Web and can be found if you know where to look. There’s no such thing as a delete button online and given that social networks are often the first port of call for potential employers (or admirers!) it pays to clean up our profiles. BullGuard offers some simple tips on how to come across well online and avoid leaving behind a trail of digital mischief. We also reveal the results of a survey which show just how savvy people are when it comes to looking after their online profile – you might be surprised.

Read more

Anonymous takes on jihadists

AnonymousHacktivist collective Anonymous has set about taking down jihadi websites and accounts, ironically putting it on the same side as European governments. But many Islamic fundamentalists are socially media savvy and have on Twitter for example, created a web of interlinking accounts to protect themselves. Is a cyber-war brewing and does Anonymous have the collective will to pursue its aims long after the atrocities of recent weeks have dropped out of the headlines?

Read more

Another bitcoin exchange hacked

bitcoinBitstamp, a trusted bitcoin exchange, has been hacked to the tune of over £3 million. ‘Don’t worry,’ says the company, it’s only a fraction of what it holds in its reserves. It’s also the latest in a long line of bitcoin hacks.

Another bitcoin exchange has been hacked with the theft of about £3.4 million in virtual currency. This time it was Bitstamp, one of the largest and most trusted of bitcoin exchanges.

Read more

North Korea and the US on common ground

ExploitYou’ve probably heard of zero-day exploits but might not know what exactly it means. It’s a type of virus that is extremely dangerous, and relatively common. Traditional antivirus detection doesn’t halt zero-day exploits however, they can be stopped. And intriguingly, governments around the world from North Korea to the US pay a lot of money for information on zero-day discoveries – so they can turn them against others.

Read more

Uncertain New World

Uncertain New WorldSuch as been the far reaching influence of technology that today a measure of success is the technology we use whether it’s the latest smartphone or a device with supercomputing power. That said, the rapid pace of change that follows technology advancements means we are also more open to cyber mishaps and hacks that can have a huge impact on our lives, and in the most extreme cases bring life itself it to a juddering halt.

Read more

Security predictions for 2015

Security predictions 2015As law enforcement ramps up its endeavours against cyber criminals and new mobile payment systems gather steam we can expect to see hackers turn their attentions to developing malware that covers their tracks as well begin probing systems such as Apple Pay and smartphone based payment methods.

We can also expect more of the same in terms of high profile targeted attacks, while low level state-sponsored attacks will become the norm rather than the exception.

Read more

The Sony hack – what’s missing?

sony hackedAmid the gossip, fury and diplomatic activity over the Sony hack a few important points have been overlooked; thousands of employees had their personal information posted online proving that many organisations can’t be trusted to provide security and cyber actions by nation states are here to stay accompanied by ever louder cries of denial.

Read more

Freaky phones and snooping spooks

Internet securityThe history of computer security reads like the progression from the clubs and crude stone axes of Neanderthal man (and woman) to the pumping pistons and huge steel wheels of the industrial revolution, except it has largely happened in the past 40 years. Looking back at online security in the past 40 years we’ve gone from simple virus detection to mass surveillance of entire populations in a startlingly short time.

Read more