Hey, did you know that your Kindle is spying on you? And here’s how to stop it

kindle amazonE-book readers are great, right? But are you aware that they also gather data on all of your reading habits? And in the US this information can be used to prosecute individuals. Of course, e-book manufacturers don’t tell you this. And while shops like Amazon talk about protecting privacy, what they do with data from its Kindle e-reader for instance, is buried in thousands of words of legal jargon. It’s certainly not upfront and straightforward. They don’t say ‘we spy on your reading habits, but that is what they do. But you can stop it, if you want to.

Read more


How hackers access your computer

hackThe internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.

Read more


Hi-tech Movie Myths

hack.movieTraffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.

Read more


Secure your passwords – How to stay safe online

Pass ParadoxComputer passwords; they’re mundane and every day and even the most complex can be cracked – eventually. But that shouldn’t stop you from protecting your digital life with a password that will give hackers headaches until an alternative comes along such as the pill which is activated by stomach acid and sends out an 18-bit ECG-like signal or a RFID chip injected into your body. Sounds crazy but being they’re being worked on as you read this. To find out more and how to set a real tough nut password read on.

Read more


Security predictions for 2015

Security predictions 2015As law enforcement ramps up its endeavours against cyber criminals and new mobile payment systems gather steam we can expect to see hackers turn their attentions to developing malware that covers their tracks as well begin probing systems such as Apple Pay and smartphone based payment methods.

We can also expect more of the same in terms of high profile targeted attacks, while low level state-sponsored attacks will become the norm rather than the exception.

Read more


2014 – Celebrities exposed, political points made and a game of whack-a-mole just begun

looking back in 2014As the year draws to a close there has certainly been a spike in criminal cyber activity. In a sense, events this year are no different than previous years except the scale of activity is increasing and the damage more widespread. There’s also the irrevocable sense that the cyber and physical worlds are now so finely entangled that actions in one inevitably echo loud and clear in the other.

Read more


Digital Detox, anyone?

Digital detox, anyone?A digital detox is the latest trend in retreats. Communities are actually depriving themselves of decent broadband connections in order to brand themselves as ‘digital-free destinations’ to attract visitors. The Grenadines in the Caribbean have resorts offering digital detox holiday packages. What does this include you ask?

Read more