Why Windows ended XP support

windows xpMicrosoft stopped supporting its Windows XP operating system for ordinary users back in April of this year. But there are still millions of people using it for various reasons from software that is incompatible with newer versions of Windows to hardware designed specifically to run off XP. As such there are ways to protect XP users but in the final analysis XP signals the end of an era as we slide into mobile, anywhere, anytime computing.

Read more


Data breaches – a security risk

Hacker stealing data from a laptopSome data breaches are small such as stolen laptops and some are enormous like retailers that get hacked and lose millions of customer details. But all have the potential to wreak great damage. In the face of what sometimes seems like a deluge of personal data exposures many people might feel powerless. However, there are simple and effective measures that can be taken to safeguard data and protect against the negligence of others.

Read more


What are Botnet DDoS attacks?

DDoS attackBotnets are responsible for much of the online fraud, scams and hack attacks that we see today. Consisting of networks of hijacked computers, and remotely controlled by hackers, they’ve been around a while and they’re going to be around a while longer too. That said, it’s relatively easy to ensure your computer doesn’t become a ’slave’ device to a hacker’s plans.

Read more


Child Safety Week and how to use parental control software

Child Safety Week and how to use parental control softwareThe coming days are dedicated to flagging up potential dangers faced by children. Given that many parents are unsure about parental control software we thought it is an appropriate time to remind everyone just how useful online parental control is and also just how simple it is to use.

This week is Child Safety Week.  It’s an annual campaign run by the Child Accident Prevention Trust (CAPT) and is designed to raise awareness about child accidents and how they can be prevented.

Read more


US is the Capital of Malware

Computer VirusIn the fourth quarter of 2013, the United States of America hosted 44% of all malware.

That’s almost 5 times more than the second-leading malware-hosting nation: the United Kingdom, who only came in at 10%. That’s quite a lead for the U.S.

So which brands are hosting malware, unintentionally? Amazon is reportedly responsible for 16%, while Go Daddy comes in at a close second with 14%. This data is especially interesting, when you think about how many articles cite Eastern Europe as the culprit. Don’t be fooled – the US is now producing more volumes of malware code than anyone else in the world.

Read more


Mobile hacking – the new trend in the mobile app hacking world

Mobile hackingThis blog sometimes runs the risk of become something of a Cassandra given the nature of the topics we cover. But we’d be failing in our duty if we didn’t bring things to your attention we think you should be aware of. As the old saying goes, ‘Forewarned is forearmed.’

And that said there’s rarely a dull moment in the online world with headline leading hacks happening on an almost weekly basis.  And the issues that have surfaced recently are very relevant to everyone who makes use of mobile computing.

Read more


Department of Homeland Security – data breach

Data breachIn January 2014, Homeland Security has been breached by hackers, ironically. A web portal for the U.S. Department of Homeland Security containing private and financial documents for more than 110 organizations was hacked.

Apparently the companies affected had bid on a Science and Technology contract for a division within Homeland Security.  The source is currently undetermined.

 

Read more


Red Handed – a Crime Reporting App for iPhone

Crime reporting appWould you report a crime via an app? Well the option is out there. iPhone app Red Handed allows you to film and post videos of any crimes you witness. Instead of an app centered around a social network, this one is more focused on social awareness. Everyone’s always filming the ridiculous things they witness around them, and uploading them to YouTube, this app is just taking advantage of existing behavior and putting it to good use.

 

Read more


Hacktivists – Cyber rebels without a pause

Anonymous“The Internet is not some playground that corporations and governments can take basic civil liberties with and destroy them and get away with it.”

This statement by an online hacktivist pretty much sums up the ethos of many, who take it as their responsibility to protect the online world from the encroachment of government and big business. It’s what spurs and motivates many hacktivist groups to carry out high profile attacks aimed at embarrassing those in authority and mocking those who claim the Internet as their commercial playground.

Read more


Yahoo email accounts hacked

Yahoo email accounts hackedChange your password!

Yahoo, the world’s second largest email service, has revealed an attempted hack on customer’s email accounts. The company hasn’t said how many accounts have been hacked but it has said it is contacting those who have been affected.

Yahoo is believed to have about 273 million accounts worldwide, including 81 million in the US. If you’ve got a Yahoo account, and haven’t received a notification from the company, it’s worth changing your password anyway, just to be on the safe side.

Read more