How secure is the cloud?

cloud securityThe cloud has become a ubiquitous reference for internet-based technologies. Compared to in-house IT infrastructures, it offers compelling advantages such as lower costs, services on tap, and pay-as-you-use payment models. However, there’s always been a bit of a cloud hanging over cloud computing; is it secure? In theory, yes, it’s secure. It’s just that sometimes people get in the way and make it insecure.

Read more


Security News : Polish Airline gets hacked; Samsung Galaxy Users are in danger

cybercrimeSeismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability

Read more


4 million US employees’ data hacked

spy mobileThe US government recently revealed details of a hack in which up to 4 million records of current and former employees were scooped in a hack. Fingers were pointed at the Chinese who have track record when it comes to this sort of attack. But no one is entirely clean and certainly the US has created its fair share of silent and devastating malware platforms that are still out there. And this sort of thing has actually been going on for years.

Read more


Stuxnet – malware that just won’t die

stuxnet malwareStuxnet is being used by North Korea with the aim of destroying cities and killing people. It was used to infiltrate North Korean networks with the intent of destroying physical infrastructure. It has been discovered on the International Space Station. It allegedly wrecked part of a Russian nuclear plant. Is there anything Stuxnet can’t do? We know it tore apart centrifuges at an Iranian uranium enriching plant over five years ago. But is it as lethal and ubiquitous as it’s claimed or has it simply gained mythical status because it was the world’s first cyber weapon?

Read more


The A to Z of malware [INFOGRAPHIC]

Virus alertSo you want to know exactly what malware is. It’s an umbrella term for a wide range of online threats from ubiquitous viruses to spooky scareware and a lot more.

This infographic gives you the inside track on the scourge that is malware and even explains what botnets are; ranks of hijacked computers that among other things, send out malware. Read more


How are webcams hacked and how to protect yourself from attacks

hack.movieFancy a chat with a friend in Lithuania, catch up with the folks back home in Gdansk or check something new in Prague? Webcams are a great tool for communicating long distance, you can see who you’re talking to and gain a whole new dimension to online chats (even if it is slightly convex and everybody appears a bit round around the head). But, sorry to say if it’s on the internet, and webcams truly are, it’s hackable. And webcam hacking is the ultimate invasion of privacy… and there’s the horror.

Read more


How hackers access your computer

hackThe internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.

Read more


Botnet network taken down, destructive critical infrastructure attacks up

safety internet hackerThere’s always something going on in the cyber world but the past week has been particularly noteworthy, ranging from businesses fighting back with a useful scam tracker to worrying findings suggesting that destructive attacks on critical infrastructure organisations are actually far more frequent than you would think.

Read more