How secure is the cloud?

cloud securityThe cloud has become a ubiquitous reference for internet-based technologies. Compared to in-house IT infrastructures, it offers compelling advantages such as lower costs, services on tap, and pay-as-you-use payment models. However, there’s always been a bit of a cloud hanging over cloud computing; is it secure? In theory, yes, it’s secure. It’s just that sometimes people get in the way and make it insecure.

Read more


Security News : Polish Airline gets hacked; Samsung Galaxy Users are in danger

cybercrimeSeismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability

Read more


How secure is the new Apple Watch?

apple_watchThe release of new Apple product is always greeted with near hysteria and the Apple Watch is no different. The ability to buy goods by waving your wrist at a terminal is one of the features proudly touted by Apple, as is the technically tough security of its Apple Pay system. And certainly these are achievements to be acknowledged. But just how secure is it and how long will it be before some hacks it?

Read more


Cybersecurity report reveals the true magnitude of the data hacking industry

data breachIndustry reports can be as appetising as chewing on wet concrete. But two recently released missives from Infonetics and Verizon paint interesting if not alarming pictures; the growth of mobile malware is rapidly accelerating and the hacked credit card industry is worth more than the global trade in cocaine. Reading between the lines both reports point to a well-known but rarely voiced truism; you can only ever really rely on yourself because those charged with protecting our data, simply aren’t doing it.  

Read more


How to tell if your cell phone is tracked, tapped or monitored by spy software

smartphone spywareThere’s some very powerful spy software available for snooping on mobile phones. But nobody would spy on you would they? Well, bugging happens at all sorts of levels from political worthies to anonymous everyday people. If you find your mobile phone chewing through battery life or your data usage rockets skywards, these could be signs of snooping. And if not read on to become acquainted with snooping clues, in this age of mass surveillance they could be very useful.

Read more


8 tips to protect your privacy online

online privacyThe loss of privacy in the Internet age is a reality. Depending on the browser and services you use, your every click, website review, and online purchase can be collected, analysed and used to create a profile that’s readily sold off to advertisers and others. Do you really want to shrug your shoulders and say your privacy doesn’t matter?

Read more


How hackers access your computer

hackThe internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.

Read more


Hi-tech Movie Myths

hack.movieTraffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.

Read more