Out of control kids?

internet and kidsThe digital generation gap can leave parents floundering as they try to keep up with their children’s digital expertise. Many, understandably, are worried that the kids can be exposed to all sorts of online nasties and don’t know what to do about it. A BullGuard survey illustrates this with the vast majority of parents feeling like their children are growing up far too quickly. But a few simple steps can help educate the children while also ensuring parents can still keep a protective but discreet arm around them.

Read more


Everybody loves email

emailFrom grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.

Read more


Watch out, an Exe is about

email malware .exe attachments are a favourite tool for cyber villains to download malware onto your computer. That said they’re easy to identify and safeguard against if you know what you’re looking for. But hackers take it as a given that most people don’t know how to identify different file types hence the continued popularity of .exe attachments to hide malware.

One of the most common tricks used by hackers is to get unsuspecting users to click on a malicious .exe file which leads to malware being downloaded onto a computer. They’re usually sent to you as an email attachment with the email offering some form of compelling inducement to get you to open the attachment.

Read more


Spooky silence

HalloweenBet you didn’t know that according to Wikipedia Halloween is a Christian feast influenced by Celtic harvest festivals with possible pagan roots, particularly the Gaelic Samhain. Thought so. But does it matter? Today Halloween is great fun for children… and hackers. Hackers? In the parlance it’s a calendar event that is used to slip all sorts of rogue malware beneath the radar. But this Halloween it’s eerily quiet on the hacking front, which begs the question, what’s cooking in the cyber crime cauldron?

Read more


Blog it… and back it up

blog hackedWith something like 500 million blogs out there some of them are inevitably going to be compromised by hackers. If you find that your blog has been hacked the first step is to check whether the web hosting company that provides the blog platform has been hacked. If not, then you’re probably the victim of a specific attack. If so, there are a few simple things you can do to get you and up and running again… and to stop any future attacks.

Read more


Media storm sets the scene

hackWith high profile cyber hacks happening almost every week and the media often covering them in a breathless and sensationalist manner you’d be forgiven for thinking that going on to the internet is the equivalent of heading to Raqqa in Syria waving a large crucifix – a suicide mission. While of course, there are many dangers for the unprotected we’re not under siege by cyber misfits, we’re simply dealing with the downside of an interconnected world.

Read more


Ten top tips for safe online banking and shopping

credit cardOnline banking and shopping are great ways to keep on top of your finances and buy the things you need without having to elbow, and be elbowed, your way through high street crowds. However, both activities are targets for hackers keen to get their digital paws on your personal information. That said, follow a few simple rules, as set out below, and you’ll be safe.

Read more


Why Windows ended XP support

windows xpMicrosoft stopped supporting its Windows XP operating system for ordinary users back in April of this year. But there are still millions of people using it for various reasons from software that is incompatible with newer versions of Windows to hardware designed specifically to run off XP. As such there are ways to protect XP users but in the final analysis XP signals the end of an era as we slide into mobile, anywhere, anytime computing.

Read more


Data breaches – a security risk

Hacker stealing data from a laptopSome data breaches are small such as stolen laptops and some are enormous like retailers that get hacked and lose millions of customer details. But all have the potential to wreak great damage. In the face of what sometimes seems like a deluge of personal data exposures many people might feel powerless. However, there are simple and effective measures that can be taken to safeguard data and protect against the negligence of others.

Read more