About Steve Bell

Steve has a background in IT and business journalism and in the past has written extensively for both the UK national and trade press including The Guardian, Independent-on-Sunday, The Times, The Register, MicroScope and Computer Weekly. He's also worked for most of the world's largest IT companies in a copy and content producing capacity. He has a particular focus on IT security and has been involved in writing about the industry at various levels ranging from magazine launches to producing newsletters. He also runs a small copy writing business called Art of Words. When not bashing away at a keyboard he can sometimes be found in a boxing gym making futile efforts to keep fit or marveling at the works of Sufi poets such as Jalaluddin Rumi and Hafiz of Shiraz.


A plague on your Apple

Facebook Scam PageIn the wake of the Apple iPhone 6 launch, scammers, skansters and fraudsters have been busy setting up Apple themed social network pages, fraudulent competitions and SMS and email phishing campaigns, in order to get their hands on your sensitive information. Here are some tips to guard against their tricks.

Read more


BullGuard CEO wins award – for creating one of the strongest online security companies in the market

BullGuard

BullGuard’s CEO, Nedko Ivanov, has been awarded winner status in Finance Monthly’s 2014 CEO award.

It reflects extremely positively on the company, its staff and its products. From the customer perspective, it’s also a glowing endorsement because it means they’re using some of the best security software on the market.

Read more


Why Windows ended XP support

windows xpMicrosoft stopped supporting its Windows XP operating system for ordinary users back in April of this year. But there are still millions of people using it for various reasons from software that is incompatible with newer versions of Windows to hardware designed specifically to run off XP. As such there are ways to protect XP users but in the final analysis XP signals the end of an era as we slide into mobile, anywhere, anytime computing.

Read more


Data breaches – a security risk

Hacker stealing data from a laptopSome data breaches are small such as stolen laptops and some are enormous like retailers that get hacked and lose millions of customer details. But all have the potential to wreak great damage. In the face of what sometimes seems like a deluge of personal data exposures many people might feel powerless. However, there are simple and effective measures that can be taken to safeguard data and protect against the negligence of others.

Read more


What are Botnet DDoS attacks?

DDoS attackBotnets are responsible for much of the online fraud, scams and hack attacks that we see today. Consisting of networks of hijacked computers, and remotely controlled by hackers, they’ve been around a while and they’re going to be around a while longer too. That said, it’s relatively easy to ensure your computer doesn’t become a ’slave’ device to a hacker’s plans.

Read more


5 ways to recover deleted internet history data easily

Recover Internet HistoryNothing is ever deleted on a computer. Even though delete functions exist the data still remains somewhere in the computer, whether on the hard drive or in obscure files tucked away deep in the operating system. Recovering deleted internet history is quite straightforward if you know what you’re doing. And if you do want to know what you’re doing, read on. 

There are many reasons why you would want to recover deleted internet histories. These range from anxious parents worried about whether their children are visiting inappropriate websites or being sucked into some nefarious underworld, to simply wanting to recover the forgotten URL of a website you used which was useful, but you thought you’d never visit again, until you remembered it.

Read more


How to mirror your Android device onto a TV

Mirror your Android device onto a TV Until recently, Google’s Chromecast only allowed you to access content from certain apps and flip them onto your TV screen. A recent upgrade, however, changes all that and you can now ‘mirror’ everything on your Android device onto the TV. It’s very simple to do. Read on to find out how.

We’ve all gotten used to small bits of technology doing big funky things that we can become a bit unimpressed by the seemingly excessiveness of digital developments.

Read more

Plugin by Social Author Bio