There’s always something going on in the cyber world but the past week has been particularly noteworthy, ranging from businesses fighting back with a useful scam tracker to worrying findings suggesting that destructive attacks on critical infrastructure organisations are actually far more frequent than you would think.
BullGuard has released a valuable guide to protecting children online. It’s packed with practical tips, the results of a parents’ survey, further references and simple common sense advice. In a seemingly complex area it’s a beacon of simple and sound advice that will help you keep your kids safe online.
Traffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.
With spyware and adware already tracking our movements across the web who needs another form of intrusive monitoring? It seems like some people can’t get enough of tracking others and emails that tell the senders whether you’ve opened an email and where you were if you did are becoming more common. However, help is at hand. Ugly Mail is the simplest of tools and it lets you know if an email that has dropped into your inbox is designed to track you.
Malware exploit kits are believed to account for most malware infections today. These kits are rented out to hackers, spammers and phishers so they can out their nefarious activities. Find out all you need to know about malware exploit kits from where they originate to how to protect yourself.
In 2004 phishing was officially recognized as a global, industrial-scale problem. Since then it has become even more entrenched with scammers all over the world, from the Ukraine and India, to the US and Belgium, adopting it. But today, it is also mutating into spear phishing, precise attacks aimed at specific and lucrative targets.
The Western World is rapidly moving towards mobile computing; it’s fast, easy and powerful and in most cases can enable the same, and higher, levels of computing as desktop PCs and laptops. As a result, phablets, a hybrid smartphone and tablet are becoming increasingly popular with analysts predicting that their growth will eventually outstrip that of tablets and traditional smartphones. They are serious devices, but they also need serious protection.
For most people talk of computer code elicits an almighty yawn, it’s the realm of geeks. But code bugs are responsible for some terrible events and even the innocuous, ubiquitous and irrepressibly popular emojis have been recently been exposed as potential carriers of bad things.
Bitstamp, a trusted bitcoin exchange, has been hacked to the tune of over £3 million. ‘Don’t worry,’ says the company, it’s only a fraction of what it holds in its reserves. It’s also the latest in a long line of bitcoin hacks.
Another bitcoin exchange has been hacked with the theft of about £3.4 million in virtual currency. This time it was Bitstamp, one of the largest and most trusted of bitcoin exchanges.
You’ve probably heard of zero-day exploits but might not know what exactly it means. It’s a type of virus that is extremely dangerous, and relatively common. Traditional antivirus detection doesn’t halt zero-day exploits however, they can be stopped. And intriguingly, governments around the world from North Korea to the US pay a lot of money for information on zero-day discoveries – so they can turn them against others.