Traffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.
Gaming has gone from a niche activity back in the day, when only the devoted and fanatical applied themselves to games like Doom, to an explosive pastime enjoyed by over one billion people. Today’s games are clever, sophisticated and challenging. They’re also a target for hackers. If you’re a gaming fan, read on to discover how to protect yourself and how to identify potential attacks.
April Fools’ Day is a time of mirth. Funny stories do the rounds in the press such as chickens laying square eggs complete with pictures and the Queen setting up a fracking rig in the grounds of Buckingham Place. But a word to the wise, as a ‘calendar day’ April Fools’ Day is also used by online tricksters. Discover some of the funny, or not so funny viruses, that have tricked people in the past and arm yourself with some simple information to keep you safe.
Malware exploit kits are believed to account for most malware infections today. These kits are rented out to hackers, spammers and phishers so they can out their nefarious activities. Find out all you need to know about malware exploit kits from where they originate to how to protect yourself.
In 2004 phishing was officially recognized as a global, industrial-scale problem. Since then it has become even more entrenched with scammers all over the world, from the Ukraine and India, to the US and Belgium, adopting it. But today, it is also mutating into spear phishing, precise attacks aimed at specific and lucrative targets.
Today is Safer Internet Day. The aim is to promote safer and more responsible use of technology, especially amongst children and young people across the world. In keeping with the theme BullGuard carried out a survey to find out how parent’s think about their children’s use of technology. Unsurprisingly parents think their kids spend too long using technology. Surprisingly, perhaps in a fit of honesty, parents admit to doing the same. Read on.
Everything we post online is forever present in cyberspace. Emails, updates, messages – even those old photos and videos that make us cringe are stored somewhere in the World Wide Web and can be found if you know where to look. There’s no such thing as a delete button online and given that social networks are often the first port of call for potential employers (or admirers!) it pays to clean up our profiles. BullGuard offers some simple tips on how to come across well online and avoid leaving behind a trail of digital mischief. We also reveal the results of a survey which show just how savvy people are when it comes to looking after their online profile – you might be surprised.
Hacktivist collective Anonymous has set about taking down jihadi websites and accounts, ironically putting it on the same side as European governments. But many Islamic fundamentalists are socially media savvy and have on Twitter for example, created a web of interlinking accounts to protect themselves. Is a cyber-war brewing and does Anonymous have the collective will to pursue its aims long after the atrocities of recent weeks have dropped out of the headlines?
You’ve probably heard of zero-day exploits but might not know what exactly it means. It’s a type of virus that is extremely dangerous, and relatively common. Traditional antivirus detection doesn’t halt zero-day exploits however, they can be stopped. And intriguingly, governments around the world from North Korea to the US pay a lot of money for information on zero-day discoveries – so they can turn them against others.
The history of computer security reads like the progression from the clubs and crude stone axes of Neanderthal man (and woman) to the pumping pistons and huge steel wheels of the industrial revolution, except it has largely happened in the past 40 years. Looking back at online security in the past 40 years we’ve gone from simple virus detection to mass surveillance of entire populations in a startlingly short time.