About Steve Bell

Steve has a background in IT and business journalism and in the past has written extensively for both the UK national and trade press including The Guardian, Independent-on-Sunday, The Times, The Register, MicroScope and Computer Weekly. He's also worked for most of the world's largest IT companies in a copy and content producing capacity. He has a particular focus on IT security and has been involved in writing about the industry at various levels ranging from magazine launches to producing newsletters. He also runs a small copy writing business called Art of Words. When not bashing away at a keyboard he can sometimes be found in a boxing gym making futile efforts to keep fit or marveling at the works of Sufi poets such as Jalaluddin Rumi and Hafiz of Shiraz.

Black Friday Bonanza

Black FridayThe 24 hour sales frenzy is almost upon us. It’s a great time to scoop up some bargains – especially online. However, be wary, cyber criminals come crawling out of the digital ether at this time while many retailers can be extremely disingenuous with their pricing so the apparent bargain may not be all it’s billed as. However, you can avoid the pitfalls by being armed with a simple bit of knowledge, and in the process and scoop up your own bargain.

Read more

Out of control kids?

internet and kidsThe digital generation gap can leave parents floundering as they try to keep up with their children’s digital expertise. Many, understandably, are worried that the kids can be exposed to all sorts of online nasties and don’t know what to do about it. A BullGuard survey illustrates this with the vast majority of parents feeling like their children are growing up far too quickly. But a few simple steps can help educate the children while also ensuring parents can still keep a protective but discreet arm around them.

Read more

Everybody loves email

emailFrom grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.

Read more

7 rules to protect yourself from phishing scams

PhishingAs internet usage has grown, phishing scams have exploded. It’s easy to see why. A scammer only needs to get a relatively small number of hits to make a success of the scam. That said, many people are now savvy to phishing but as a result phishing sophistication is evolving. Here’s what to watch out for to make sure you’re not taken in.

Read more

By the experts… for the people

BullGuard Internet SecurityBullGuard Internet Security has been updated with compelling features making it the most important product update of the year. Alongside improvement to its core protection features new tools have been added, at the request of customers. These tools are designed to improve internet browsing and put an end to irritating applications hijacking your browser while also ensuring that your computer runs at tip top performance levels, irrespective of its specifications. And there’s more. Users will receive these new updates automatically and continue to benefit from further updates as soon as they are ready.

Read more

Watch out, an Exe is about

email malware .exe attachments are a favourite tool for cyber villains to download malware onto your computer. That said they’re easy to identify and safeguard against if you know what you’re looking for. But hackers take it as a given that most people don’t know how to identify different file types hence the continued popularity of .exe attachments to hide malware.

One of the most common tricks used by hackers is to get unsuspecting users to click on a malicious .exe file which leads to malware being downloaded onto a computer. They’re usually sent to you as an email attachment with the email offering some form of compelling inducement to get you to open the attachment.

Read more

Spooky silence

HalloweenBet you didn’t know that according to Wikipedia Halloween is a Christian feast influenced by Celtic harvest festivals with possible pagan roots, particularly the Gaelic Samhain. Thought so. But does it matter? Today Halloween is great fun for children… and hackers. Hackers? In the parlance it’s a calendar event that is used to slip all sorts of rogue malware beneath the radar. But this Halloween it’s eerily quiet on the hacking front, which begs the question, what’s cooking in the cyber crime cauldron?

Read more

Blog it… and back it up

blog hackedWith something like 500 million blogs out there some of them are inevitably going to be compromised by hackers. If you find that your blog has been hacked the first step is to check whether the web hosting company that provides the blog platform has been hacked. If not, then you’re probably the victim of a specific attack. If so, there are a few simple things you can do to get you and up and running again… and to stop any future attacks.

Read more

Plugin by Social Author Bio