From grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.
The UK’s National Health Service is set to launch a sweeping scheme designed to promote better healthcare and greater efficiencies. To be successful it requires the collating of patient data in a centralised database. But critics point out that private medical records could be exposed to all and everybody. The argument illustrates how the notion of privacy is being rapidly eroded in the digital age.
If you’re a regular reader of the BullGuard blog (if you’re not, you should be – sign up here!), you’ll know that with so many frequent privacy updates on Facebook, it can be hard to stay on top of these updates and how it could impact you and your account.
In the wake of the Apple iPhone 6 launch, scammers, skansters and fraudsters have been busy setting up Apple themed social network pages, fraudulent competitions and SMS and email phishing campaigns, in order to get their hands on your sensitive information. Here are some tips to guard against their tricks.
No sooner does Apple launch its new iPhone 6, smart watch and its much touted online payment system Apple Pay, than new phishing attempts designed to extract personal Apple ID details appear.
The media storm that accompanied the launch of Apple’s new iPhone 6 and its smart watch has almost settled down. Now the serious questions are being asked.
If you haven’t heard of Bluetooth-enabled skimming devices before, you definitely need to read this article. These devices are being used to steal card information. A recent scam resulted in cyber criminals making off with more than $2 million.
Skimming devices are typically installed inside gas pumps or fixed to ATM’s so that they aren’t detectable by the victims using the machines. By installing Bluetooth-enabled skimming devices, the cyber criminals are making their lives easier – the devices never have to be physically removed, because all of the data can be accessed remotely.
* Cybercrime exploding
* Social engineering on the rise
* Two thirds of UK citizens don’t have computer security
Terry is a former medical assistant-turned-certified life coach who writes about health, wellness and the power of positive thinking.
How would you feel if you went to the grocery store and found out at the checkout line that you had no money in your bank account? Normally this is embarrassing enough, but what if you knew that you should have money in the account?
As employees acquire more and more remote devices, such as laptops, tablets and mobile phones, it becomes increasingly more difficult for companies to protect the devices and the valuable data stored within each one. A recent study showed that companies are often still unprepared when it comes to security breaches and providing their employees with remote support technology.