Industry reports can be as appetising as chewing on wet concrete. But two recently released missives from Infonetics and Verizon paint interesting if not alarming pictures; the growth of mobile malware is rapidly accelerating and the hacked credit card industry is worth more than the global trade in cocaine. Reading between the lines both reports point to a well-known but rarely voiced truism; you can only ever really rely on yourself because those charged with protecting our data, simply aren’t doing it.
There’s some very powerful spy software available for snooping on mobile phones. But nobody would spy on you would they? Well, bugging happens at all sorts of levels from political worthies to anonymous everyday people. If you find your mobile phone chewing through battery life or your data usage rockets skywards, these could be signs of snooping. And if not read on to become acquainted with snooping clues, in this age of mass surveillance they could be very useful.
Hardening your wireless network is always a good idea. It stops others from ‘leeching’ your Wi-Fi and also deters potential hackers. It’s also straightforward, doesn’t require technical knowledge and can be done in minutes. Read on for a few tips.
The loss of privacy in the Internet age is a reality. Depending on the browser and services you use, your every click, website review, and online purchase can be collected, analysed and used to create a profile that’s readily sold off to advertisers and others. Do you really want to shrug your shoulders and say your privacy doesn’t matter?
The internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.
Traffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.
Gaming has gone from a niche activity back in the day, when only the devoted and fanatical applied themselves to games like Doom, to an explosive pastime enjoyed by over one billion people. Today’s games are clever, sophisticated and challenging. They’re also a target for hackers. If you’re a gaming fan, read on to discover how to protect yourself and how to identify potential attacks.
April Fools’ Day is a time of mirth. Funny stories do the rounds in the press such as chickens laying square eggs complete with pictures and the Queen setting up a fracking rig in the grounds of Buckingham Place. But a word to the wise, as a ‘calendar day’ April Fools’ Day is also used by online tricksters. Discover some of the funny, or not so funny viruses, that have tricked people in the past and arm yourself with some simple information to keep you safe.
Malware exploit kits are believed to account for most malware infections today. These kits are rented out to hackers, spammers and phishers so they can out their nefarious activities. Find out all you need to know about malware exploit kits from where they originate to how to protect yourself.
In 2004 phishing was officially recognized as a global, industrial-scale problem. Since then it has become even more entrenched with scammers all over the world, from the Ukraine and India, to the US and Belgium, adopting it. But today, it is also mutating into spear phishing, precise attacks aimed at specific and lucrative targets.