Viruses can be an irritating menace or they can be devastatingly destructive. We’ve put together an infographic that highlights the major viruses of the past three decades and just how vulnerable the internet can be to these destructive strings of code.
If you’re running a small business, even if you’ve only got two employees, do you realise you could also ruin your small business if your workers aren’t up to speed with data protection? Not the clunky legislative data protection acts that govern what data we store and how we use it, but the sensitive, operational, day-to-information such as sales figures and customer details. You can use all the technology you want to protect your business, and of course this is important, but if your employees are not ‘data educated’ your protection endeavours may just be pointless.
The past week has been full of stories about hacking military equipment and the potential for some sort of devastating cyber-attack. There’s also been the rather embarrassing incident for security software vendor BitDefender, who had a server hacked and customer details taken. And UK regulator Ofcom has confirmed what many people suspect, there’s a lot of smartphone addicts out there.
From out-of-control cars and hacks that come beaming into your radio riding the notes of a song, to the perils of ‘butt dialling’ and the inevitable growth in cybercrime it’s a week full of hacking shenanigans, more flaws and disturbing insights.
Online dating is de rigueur these days. But given the number of skanky scamsters prowling the online dating world you’re as likely to meet a lustful Lothario or frightening Medusa as a Romeo or Juliet. At least that’s what respondents to a BullGuard survey said. Read on to see if you’ve fallen foul of online dating traps and pick up some solid tips to keep you safe.
There’s rarely a quiet moment in the world of cyber miscreants and the past week testifies to this. From a newspaper columnist being threatened by Anonymous to retract her ‘strong’ opinions, to a private eye being jailed for hiring hackers, it’s all going on. And of course, another major flaw has been discovered, this time in Adobe Flash Player.
You can chat, post, like and get some banter going with friends – even if you’re 5,000 miles away. But there are enough unsavoury characters trawling these sites that it’s necessary to raise a red flag. There are also enough deep digital potholes for the unwary to stumble into that you really need to be mindful too. You can make sure you’re always safe by following these top ten safety tips.
The cloud has become a ubiquitous reference for internet-based technologies. Compared to in-house IT infrastructures, it offers compelling advantages such as lower costs, services on tap, and pay-as-you-use payment models. However, there’s always been a bit of a cloud hanging over cloud computing; is it secure? In theory, yes, it’s secure. It’s just that sometimes people get in the way and make it insecure.
Seismic shock waves are still juddering through the US establishment and flights are grounded in Poland. At the same time the revelations about the extent of NSA/GCHQ spying are still spilling out and the latest batch of documents reveal how GCHQ attempted to undermine consumer security software. And the humble plain pitta bread could find itself thrust into the annals of international cyber skulduggery… and more including a serious Samsung Galaxy vulnerability
The US government recently revealed details of a hack in which up to 4 million records of current and former employees were scooped in a hack. Fingers were pointed at the Chinese who have track record when it comes to this sort of attack. But no one is entirely clean and certainly the US has created its fair share of silent and devastating malware platforms that are still out there. And this sort of thing has actually been going on for years.