About Steve Bell

Steve has a background in IT and business journalism and in the past has written extensively for both the UK national and trade press including The Guardian, Independent-on-Sunday, The Times, The Register, MicroScope and Computer Weekly. He's also worked for most of the world's largest IT companies in a copy and content producing capacity. He has a particular focus on IT security and has been involved in writing about the industry at various levels ranging from magazine launches to producing newsletters. He also runs a small copy writing business called Art of Words. When not bashing away at a keyboard he can sometimes be found in a boxing gym making futile efforts to keep fit or marveling at the works of Sufi poets such as Jalaluddin Rumi and Hafiz of Shiraz.

The best things in life are free…

free_softwareSunshine, laughter, the chuckle of a child, water, swimming, twinkling nature, mountains, rivers, a lover’s kiss and yes, even software. Comparing software to the free warmth of the sun and a cool refreshing breeze may jolt and jar but given that so many of us spend lots of time on computers it’s nice to know that there is the digital equivalent of mother natures’ bounty. Check this list of free software and you may not only be pleasantly surprised but you could also save money.

Read more

How secure is the cloud?

cloud securityThe cloud has become a ubiquitous reference for internet-based technologies. Compared to in-house IT infrastructures, it offers compelling advantages such as lower costs, services on tap, and pay-as-you-use payment models. However, there’s always been a bit of a cloud hanging over cloud computing; is it secure? In theory, yes, it’s secure. It’s just that sometimes people get in the way and make it insecure.

Read more

Security News : Polish Airline gets hacked; Samsung Galaxy Users are in danger

cybercrimeSeismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability

Read more

4 million US employees’ data hacked

spy mobileThe US government recently revealed details of a hack in which up to 4 million records of current and former employees were scooped in a hack. Fingers were pointed at the Chinese who have track record when it comes to this sort of attack. But no one is entirely clean and certainly the US has created its fair share of silent and devastating malware platforms that are still out there. And this sort of thing has actually been going on for years.

Read more

Whoops… there goes another technology fail

technology failuresThere have been some spectacular advances in technology propelling the human race onwards and upwards. Of course, we naturally and correctly celebrate these successes. But there have also been some significant fails, but we don’t talk about them, do we? But others failures should be embraced as a way of saying welcome to the human race. And in that spirit here are some tech fails that will probably make you feel better about your own trips, stumbles and occasional headlong plunges into the abyss.

Read more

5 apps that may be dangerous for teens

mobile apps and teensAs a parent all you want to do is make sure the kids are safe online. It sounds easy enough but without stepping all over the children’s privacy it’s certainly not simple. Communication is central and ladles of diplomacy are often required too. Today’s teens are the true digital generation and they’re well versed in all the important apps used by their peer groups. But are they aware of the dangers and are you? To bring you up to speed, below is a run-down of the most popular apps/sites used by today’s teens.

Read more

Wearable Technology and Wearable Computer Devices

wearable devicesThe craze for wearable tech is just building up ahead of steam. But when interconnected wearables become common, today’s smart watches will seem like yesterday’s clunky grey box PCs. The enticing thing about wearable devices connecting with each other is the amazing potential but with great opportunity comes great risk and unless security is nailed down from the beginning we could see wearables becoming just as hackable as today’s computers.

Read more

Plugin by Social Author Bio