On paper the recently discovered Shellshock virus has the potential to cause widespread chaos. In reality, it’s likely to affect only those who have poor and outdated security practises – though that might well be a large number.
The recent discovery of the Shellshock vulnerability certainly sent shockwaves rippling around the world with concerns about the potential damage to critical national infrastructure. The UK’s cyber security team Cert-UK sent an alert to all government departments saying the flaw had the ‘highest possible’ threat ratings. The US National Cyber Security Division ranked it ten out of ten for severity.
Cyberbullying is a word we’re all very familiar with, typically in reference to children and teenagers, but how often do you hear of adult cyberbullying? According to a recent study in Australia, 35% of adults have identified as being victims of cyberbullying.
The media storm that accompanied the launch of Apple’s new iPhone 6 and its smart watch has almost settled down. Now the serious questions are being asked.
Microsoft stopped supporting its Windows XP operating system for ordinary users back in April of this year. But there are still millions of people using it for various reasons from software that is incompatible with newer versions of Windows to hardware designed specifically to run off XP. As such there are ways to protect XP users but in the final analysis XP signals the end of an era as we slide into mobile, anywhere, anytime computing.
Some data breaches are small such as stolen laptops and some are enormous like retailers that get hacked and lose millions of customer details. But all have the potential to wreak great damage. In the face of what sometimes seems like a deluge of personal data exposures many people might feel powerless. However, there are simple and effective measures that can be taken to safeguard data and protect against the negligence of others.
Botnets are responsible for much of the online fraud, scams and hack attacks that we see today. Consisting of networks of hijacked computers, and remotely controlled by hackers, they’ve been around a while and they’re going to be around a while longer too. That said, it’s relatively easy to ensure your computer doesn’t become a ’slave’ device to a hacker’s plans.
The coming days are dedicated to flagging up potential dangers faced by children. Given that many parents are unsure about parental control software we thought it is an appropriate time to remind everyone just how useful online parental control is and also just how simple it is to use.
That’s almost 5 times more than the second-leading malware-hosting nation: the United Kingdom, who only came in at 10%. That’s quite a lead for the U.S.
So which brands are hosting malware, unintentionally? Amazon is reportedly responsible for 16%, while Go Daddy comes in at a close second with 14%. This data is especially interesting, when you think about how many articles cite Eastern Europe as the culprit. Don’t be fooled – the US is now producing more volumes of malware code than anyone else in the world.
This blog sometimes runs the risk of become something of a Cassandra given the nature of the topics we cover. But we’d be failing in our duty if we didn’t bring things to your attention we think you should be aware of. As the old saying goes, ‘Forewarned is forearmed.’
And that said there’s rarely a dull moment in the online world with headline leading hacks happening on an almost weekly basis. And the issues that have surfaced recently are very relevant to everyone who makes use of mobile computing.
In January 2014, Homeland Security has been breached by hackers, ironically. A web portal for the U.S. Department of Homeland Security containing private and financial documents for more than 110 organizations was hacked.
Apparently the companies affected had bid on a Science and Technology contract for a division within Homeland Security. The source is currently undetermined.