About Steve Bell

Steve has a background in IT and business journalism and in the past has written extensively for both the UK national and trade press including The Guardian, Independent-on-Sunday, The Times, The Register, MicroScope and Computer Weekly. He's also worked for most of the world's largest IT companies in a copy and content producing capacity. He has a particular focus on IT security and has been involved in writing about the industry at various levels ranging from magazine launches to producing newsletters. He also runs a small copy writing business called Art of Words. When not bashing away at a keyboard he can sometimes be found in a boxing gym making futile efforts to keep fit or marveling at the works of Sufi poets such as Jalaluddin Rumi and Hafiz of Shiraz.

Online pranks and viruses on April Fools’ Day

april fools dayApril Fools’ Day is a time of mirth. Funny stories do the rounds in the press such as chickens laying square eggs complete with pictures and the Queen setting up a fracking rig in the grounds of Buckingham Place. But a word to the wise, as a ‘calendar day’ April Fools’ Day is also used by online tricksters. Discover some of the funny, or not so funny viruses, that have tricked people in the past and arm yourself with some simple information to keep you safe.

Read more

Biggest online hacks of all time [INFOGRAPHIC]

data breachThe number of organizations that have been hit by hackers reads like a ‘who’s who’ of just about every major operation on the planet. The list includes retail giants, the US military and one of the world’s largest employers, the UK’s National Health Service. That said hacks have become so common we’ve almost become accustomed to the implications – identity theft, financial loss and the sale of our personal details.

Read more

Have you lost your Microsoft Office product key? Here’s how to retrieve it

key productYour Windows or Office software usually comes bundled on your computer, along with discs that contain the product license key. But losing these discs is easy and once lost you no longer have access to the product key. So should you want to reinstall the software you could, on the surface, have a problem. However, you can recover your product license keys from the Windows Registry and it’s a lot simpler than you might think with third-party utilities. Here’s how.  

Read more

Who is tracking your smartphone? [INFOGRAPHIC]

who is tracking your smartphoneThere are over one billion smartphones in use today. It’s an enormous number and to put it in context it’s approximately one sixth of the world’s population. Smartphones are powerful tools enabling us to do all sorts of things while on the go. However, they can also track your every move and scoop up reams of personal information – without you knowing anything about it. If your phone has its geo-location services switched on, it most certainly will be monitoring your journeys.

Read more

Secure your passwords – How to stay safe online

Pass ParadoxComputer passwords; they’re mundane and every day and even the most complex can be cracked – eventually. But that shouldn’t stop you from protecting your digital life with a password that will give hackers headaches until an alternative comes along such as the pill which is activated by stomach acid and sends out an 18-bit ECG-like signal or a RFID chip injected into your body. Sounds crazy but being they’re being worked on as you read this. To find out more and how to set a real tough nut password read on.

Read more

Malware exploit kits

cybercrimeMalware exploit kits are believed to account for most malware infections today. These kits are rented out to hackers, spammers and phishers so they can out their nefarious activities. Find out all you need to know about malware exploit kits from where they originate to how to protect yourself.

Read more

Data Protection Act – changes 2015

EU data reformEverything you need to know on the new EU Regulation

The European Union’s decision to change data protection laws is a massive boost for individual privacy. It puts privacy back in the hands of individuals and firmly places the onus on companies to gain consent from individuals before sinking them beneath an unwanted avalanche of direct marketing. Here’s what it means for you.

Read more

Online Identity theft skyrockets

ID theftWith so many attacks aimed at everyday computer users, it’s often difficult to nail hacker motives. But a recent analysis of cyber theft during 2014 data reveals a startling new trend – ID theft is the top priority for hackers, over and above credit card information theft for example. In the light of these figures, if you weren’t already, it’s time to get serious about protection.

Read more

Plugin by Social Author Bio