Diving into the Deep Web – is your identity protected?

Identity theft deep webThe deep web is a vast resource of information much of it academic and of great value.  However, there is a shadow side, one where stolen identities are offered for sale, among other things. We explore what the deep web means, why it exists and highlight some of the things you need to be aware of for identity theft protection.


Read more

Zeus rules over fake social media

Facebook like Zeus TrojanHackers have turned their attentions to creating false social media ‘likes’ as they follow the money. By revamping an existing virus called Zeus and secretly planting it in thousands of computers there’s a real threat that in time it could also be used to carry out far more damaging actions.

Zeus rules over fake social media

Read more

Texting Privacy: 3 great apps to ensure your text messages stay private

Texting privacyToday, we ask the question that many of you have been curious about – just how private are your text messages?

The good news is that cell phone providers are not mandated to store or keep text messages or phone calls that are sent or received from a cell phone. However, you’re probably more at risk when that text message comes in at the wrong time, whether that’s while you’re on a date, at a meeting or asleep. Typically these aren’t major situations, however what happens when a private message is seen by someone who shouldn’t have seen it?

Read more

A Win for Online Privacy

Win photo copyGood News! The EU Commission has put in place a process for how telecom operators need to handle incidents of online privacy breaches and identity theft. This is a massive step forward in the defence of customer data. The technical measures have been implemented to ensure all victims of customer data breaches receive equal treatment as well as a solid response from the telecom operators responsible for the privacy and safety of that data.

Online Behaviour Part 2: How To Avoid Shady Characters Online

Shady online behavior_blogWith billions using the internet daily, it’s important to remember that everyone’s intent online is different, and may not be in line with yours. People may not be who they say they are. So trusting blindly can get you in trouble, and sharing information can also get you in trouble.

How To Protect Your Mobile Privacy

Mobile privacy_blog72% of mobile users have concerns about their mobile phone privacy. Are you one of them?

 Concerns around mobile phone privacy have risen in the last year. It’s no surprise that the areas of mobile usage that cause the most concerns are shopping, social media, online banking, emailing and not far behind those, mobile apps. Well my goodness – that just about covers everything that you can possibly do on a mobile! So basically, you’re worried about something every time you pick up your phone; now that really can’t be a healthy way to live.

Read more

How Concerned Are You About Your Online Privacy?

Online privacy- part 1_blogRecently, Microsoft released a study which details how we, the public, deal with the intersection of privacy and online life. Participants in the study were HR managers, 2,500 consumers and recruitment professionals in the UK, the US, Germany and France. The results showed that there is still a massive disconnect between people’s fears around privacy and their behavior online, and that education is needed to increase awareness of online privacy security and privacy online.

Not So Private Skype

Skype-not-private-blogThis is one major internet security issue that you need to know about. At the end of January, forty-five different organizations asked Skype to come clean about the real deal with Skype privacy. Is it private or not? Is it possible that governments and organizations could be monitoring your Skype conversations?

BullGuard’s Security Predictions for 2013

Security predictions_blogSome weeks ago we were talking about what security lessons we’ve learned from 2012’s tumultuous malware and hack attacks. But with devices such as smartphones and tablets becoming ever more prevalent, cybercrooks are on the lookout for new ways to steal data, and with many users slow to adopt security measures for their new devices, it’s more important than ever to be aware of the nature of new threats.