With so many attacks aimed at everyday computer users, it’s often difficult to nail hacker motives. But a recent analysis of cyber theft during 2014 data reveals a startling new trend – ID theft is the top priority for hackers, over and above credit card information theft for example. In the light of these figures, if you weren’t already, it’s time to get serious about protection.
Everything we post online is forever present in cyberspace. Emails, updates, messages – even those old photos and videos that make us cringe are stored somewhere in the World Wide Web and can be found if you know where to look. There’s no such thing as a delete button online and given that social networks are often the first port of call for potential employers (or admirers!) it pays to clean up our profiles. BullGuard offers some simple tips on how to come across well online and avoid leaving behind a trail of digital mischief. We also reveal the results of a survey which show just how savvy people are when it comes to looking after their online profile – you might be surprised.
From grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.
The UK’s National Health Service is set to launch a sweeping scheme designed to promote better healthcare and greater efficiencies. To be successful it requires the collating of patient data in a centralised database. But critics point out that private medical records could be exposed to all and everybody. The argument illustrates how the notion of privacy is being rapidly eroded in the digital age.
If you’re a regular reader of the BullGuard blog (if you’re not, you should be – sign up here!), you’ll know that with so many frequent privacy updates on Facebook, it can be hard to stay on top of these updates and how it could impact you and your account.
In the wake of the Apple iPhone 6 launch, scammers, skansters and fraudsters have been busy setting up Apple themed social network pages, fraudulent competitions and SMS and email phishing campaigns, in order to get their hands on your sensitive information. Here are some tips to guard against their tricks.
No sooner does Apple launch its new iPhone 6, smart watch and its much touted online payment system Apple Pay, than new phishing attempts designed to extract personal Apple ID details appear.
The media storm that accompanied the launch of Apple’s new iPhone 6 and its smart watch has almost settled down. Now the serious questions are being asked.
If you haven’t heard of Bluetooth-enabled skimming devices before, you definitely need to read this article. These devices are being used to steal card information. A recent scam resulted in cyber criminals making off with more than $2 million.
Skimming devices are typically installed inside gas pumps or fixed to ATM’s so that they aren’t detectable by the victims using the machines. By installing Bluetooth-enabled skimming devices, the cyber criminals are making their lives easier – the devices never have to be physically removed, because all of the data can be accessed remotely.