Have you seen what you look like online?

data privacy day

Everything we post online is forever present in cyberspace. Emails, updates, messages – even those old photos and videos that make us cringe are stored somewhere in the World Wide Web and can be found if you know where to look. There’s no such thing as a delete button online and given that social networks are often the first port of call for potential employers (or admirers!) it pays to clean up our profiles. BullGuard offers some simple tips on how to come across well online and avoid leaving behind a trail of digital mischief. We also reveal the results of a survey which show just how savvy people are when it comes to looking after their online profile – you might be surprised.

Read more


Anonymous takes on jihadists

AnonymousHacktivist collective Anonymous has set about taking down jihadi websites and accounts, ironically putting it on the same side as European governments. But many Islamic fundamentalists are socially media savvy and have on Twitter for example, created a web of interlinking accounts to protect themselves. Is a cyber-war brewing and does Anonymous have the collective will to pursue its aims long after the atrocities of recent weeks have dropped out of the headlines?

Read more


North Korea and the US on common ground

ExploitYou’ve probably heard of zero-day exploits but might not know what exactly it means. It’s a type of virus that is extremely dangerous, and relatively common. Traditional antivirus detection doesn’t halt zero-day exploits however, they can be stopped. And intriguingly, governments around the world from North Korea to the US pay a lot of money for information on zero-day discoveries – so they can turn them against others.

Read more


Freaky phones and snooping spooks

Internet securityThe history of computer security reads like the progression from the clubs and crude stone axes of Neanderthal man (and woman) to the pumping pistons and huge steel wheels of the industrial revolution, except it has largely happened in the past 40 years. Looking back at online security in the past 40 years we’ve gone from simple virus detection to mass surveillance of entire populations in a startlingly short time.

Read more


A plague on your smartphone

BYODYou may see your wonderful smartphone as an electronic brain in your pocket but IT departments the world over see them as potential plague-carrying devices that can wreak untold damage to a company network from mass data theft to viral infections. You can play your part in ensuring your company’s accounts are not plundered by getting up to speed with the issues and getting ahead of the game.

Read more


Biggest online hacks of all time

data breachEnormous online data loss drives a huge underground industry in phishing and the sale of personal data. It fuels cybercrime and has given rise to many websites on the dark web that trade in personal data. It provides hackers with a reason for being and stokes the fires of nefarious online behaviour. And it is happening with alarming frequency.

Read more


Out of control kids?

internet and kidsThe digital generation gap can leave parents floundering as they try to keep up with their children’s digital expertise. Many, understandably, are worried that the kids can be exposed to all sorts of online nasties and don’t know what to do about it. A BullGuard survey illustrates this with the vast majority of parents feeling like their children are growing up far too quickly. But a few simple steps can help educate the children while also ensuring parents can still keep a protective but discreet arm around them.

Read more


Everybody loves email

emailFrom grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.

Read more


Watch out, an Exe is about

email malware .exe attachments are a favourite tool for cyber villains to download malware onto your computer. That said they’re easy to identify and safeguard against if you know what you’re looking for. But hackers take it as a given that most people don’t know how to identify different file types hence the continued popularity of .exe attachments to hide malware.

One of the most common tricks used by hackers is to get unsuspecting users to click on a malicious .exe file which leads to malware being downloaded onto a computer. They’re usually sent to you as an email attachment with the email offering some form of compelling inducement to get you to open the attachment.

Read more


Spooky silence

HalloweenBet you didn’t know that according to Wikipedia Halloween is a Christian feast influenced by Celtic harvest festivals with possible pagan roots, particularly the Gaelic Samhain. Thought so. But does it matter? Today Halloween is great fun for children… and hackers. Hackers? In the parlance it’s a calendar event that is used to slip all sorts of rogue malware beneath the radar. But this Halloween it’s eerily quiet on the hacking front, which begs the question, what’s cooking in the cyber crime cauldron?

Read more