How secure is the new Apple Watch?

apple_watchThe release of new Apple product is always greeted with near hysteria and the Apple Watch is no different. The ability to buy goods by waving your wrist at a terminal is one of the features proudly touted by Apple, as is the technically tough security of its Apple Pay system. And certainly these are achievements to be acknowledged. But just how secure is it and how long will it be before some hacks it?

Read more

Cybersecurity report reveals the true magnitude of the data hacking industry

data breachIndustry reports can be as appetising as chewing on wet concrete. But two recently released missives from Infonetics and Verizon paint interesting if not alarming pictures; the growth of mobile malware is rapidly accelerating and the hacked credit card industry is worth more than the global trade in cocaine. Reading between the lines both reports point to a well-known but rarely voiced truism; you can only ever really rely on yourself because those charged with protecting our data, simply aren’t doing it.  

Read more

How to tell if your cell phone is tracked, tapped or monitored by spy software

smartphone spywareThere’s some very powerful spy software available for snooping on mobile phones. But nobody would spy on you would they? Well, bugging happens at all sorts of levels from political worthies to anonymous everyday people. If you find your mobile phone chewing through battery life or your data usage rockets skywards, these could be signs of snooping. And if not read on to become acquainted with snooping clues, in this age of mass surveillance they could be very useful.

Read more

The A to Z of malware [INFOGRAPHIC]

Virus alertSo you want to know exactly what malware is. It’s an umbrella term for a wide range of online threats from ubiquitous viruses to spooky scareware and a lot more.

This infographic gives you the inside track on the scourge that is malware and even explains what botnets are; ranks of hijacked computers that among other things, send out malware. Read more

How are webcams hacked and how to protect yourself from attacks

hack.movieFancy a chat with a friend in Lithuania, catch up with the folks back home in Gdansk or check something new in Prague? Webcams are a great tool for communicating long distance, you can see who you’re talking to and gain a whole new dimension to online chats (even if it is slightly convex and everybody appears a bit round around the head). But, sorry to say if it’s on the internet, and webcams truly are, it’s hackable. And webcam hacking is the ultimate invasion of privacy… and there’s the horror.

Read more

A guide to switch from Android device to iPhone and from iPhone to Android device

iphone android deviceFed up with your once cool iPhone? Tired of your fading Android device? Want to switch but just the thought of moving your contacts, photos, tunes, apps, games and all those other things you have on your device leaves you feeling slightly crazed and twitchy? Don’t despair. It can be done and it won’t leave you feeling that plucking your hair out, one follicle at a time, is a less painful option.

Read more

Top 20 sites to download Free eBooks

free ebooksYou can say whatever you like about the internet but what you can’t deny is the vast repository of free ebooks it offers for avid readers. Hundreds and thousands of titles are available from deep tech to swooning romance and literary classics – and even free audio books. And here’s a list of twenty free ebook sites from the well-known and popular to the sometimes obscure and fringe.

Read more