The A to Z of malware [INFOGRAPHIC]

Virus alertSo you want to know exactly what malware is. It’s an umbrella term for a wide range of online threats from ubiquitous viruses to spooky scareware and a lot more.

This infographic gives you the inside track on the scourge that is malware and even explains what botnets are; ranks of hijacked computers that among other things, send out malware. Read more


How are webcams hacked and how to protect yourself from attacks

hack.movieFancy a chat with a friend in Lithuania, catch up with the folks back home in Gdansk or check something new in Prague? Webcams are a great tool for communicating long distance, you can see who you’re talking to and gain a whole new dimension to online chats (even if it is slightly convex and everybody appears a bit round around the head). But, sorry to say if it’s on the internet, and webcams truly are, it’s hackable. And webcam hacking is the ultimate invasion of privacy… and there’s the horror.

Read more


How hackers access your computer

hackThe internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.

Read more


Botnet network taken down, destructive critical infrastructure attacks up

safety internet hackerThere’s always something going on in the cyber world but the past week has been particularly noteworthy, ranging from businesses fighting back with a useful scam tracker to worrying findings suggesting that destructive attacks on critical infrastructure organisations are actually far more frequent than you would think.

Read more


Hi-tech Movie Myths

hack.movieTraffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.

Read more


Ugly Mail – Gmail extension to identify e-mail tracking pixels

email With spyware and adware already tracking our movements across the web who needs another form of intrusive monitoring? It seems like some people can’t get enough of tracking others and emails that tell the senders whether you’ve opened an email and where you were if you did are becoming more common. However, help is at hand. Ugly Mail is the simplest of tools and it lets you know if an email that has dropped into your inbox is designed to track you.

Read more


Malware exploit kits

cybercrimeMalware exploit kits are believed to account for most malware infections today. These kits are rented out to hackers, spammers and phishers so they can out their nefarious activities. Find out all you need to know about malware exploit kits from where they originate to how to protect yourself.

Read more


Ten years of phishing

phishingIn 2004 phishing was officially recognized as a global, industrial-scale problem. Since then it has become even more entrenched with scammers all over the world, from the Ukraine and India, to the US and Belgium, adopting it. But today, it is also mutating into spear phishing, precise attacks aimed at specific and lucrative targets.

Read more


The Phablet Phenomenon

The Phablet PhenomenonThe Western World is rapidly moving towards mobile computing; it’s fast, easy and powerful and in most cases can enable the same, and higher, levels of computing as desktop PCs and laptops. As a result, phablets, a hybrid smartphone and tablet are becoming increasingly popular with analysts predicting that their growth will eventually outstrip that of tablets and traditional smartphones. They are serious devices, but they also need serious protection.

Read more