NEWS ALERT – Microsoft Word 2010 vulnerability targeted by hackers – Microsoft issues temporary patch

Computer hacked_resizedHackers have been targeting a security hole in the popular word processing application Word 2010. The attacks are limited at the moment to unnamed targets, possibly a number of organisations, but in the meantime Microsoft has issued a temporary fix pending a full investigation.

Microsoft has just announced that Word 2010 has a vulnerability that has already been exploited by hackers.
Read more


How to remove toolbars from Internet Explorer (with pictures)

6a0154366bdf49970c01a73d962057970d-800wiSo, you installed some new programs and all of a sudden you see in Internet Explorer new annoying toolbars.

If you’ve got a toolbar that is driving you nuts and you can’t for the life of you figure out how to get rid of it, this article is for you. Many of the toolbars you might have come across, offer no real service except to deliver advertisements, and in some cases, can be malicious.

Read more


4 Questions Schools Should Ask Regarding Implementing BYOD

6a01a3fcba138d970b01a3fcd95cda970b-800wiGuest writer: Adam Andrews

 Adam is a teacher and blogger from Boston.

 The ‘Bring Your Own Device’ (BYOD) trend sounds like a great concept, and many employees love the idea of connecting to work via their own tablets and smartphones any time they want. BYOD in the workplace push is certainly growing, as witnessed by a survey of 1,000 ZDnet and TechRepublic readers earlier this year which concluded that 44 percent of companies already have BYOD policies and 18 percent plan to add them in the next year. Though more employees are requesting this approach, IT directors still struggle with issues like security and compliance.

Read more


Is my computer infected with a virus?

6a0154366bdf49970c01a3fcd7a13e970b-800wiComputer viruses may vary, but they all have one thing in common: they make your life absolutely miserable.

 The specific symptoms and the impact to your computer system all depends on exactly what type of virus your computer is infected with; in fact in some cases your computer may not show any signs at all! In that case, how on earth are you supposed to be able to keep track of your computer’s health?

Read more


Discover why your computer is running slow

6a019104fef791970c01a73d8f0108970d-800wiIs your computer slow?

 You know when your computer is not doing its thing when you click on something and you can count the seconds before the computer responds. And given that we’re so used to performance at the speed of light those seconds can feel like minutes and hours.

It’s almost natural to assume that its part of the computer’s ageing process, a bit like a body that simply wears out over time. But before you begin gnashing your teeth and pointedly digging a pen into your desk, it’s worth considering that performance problems can be fixed. There are many reasons why computers run slow and by and large they tend to form a common pattern.

Read more


US is the Capital of Malware

Computer VirusIn the fourth quarter of 2013, the United States of America hosted 44% of all malware.

That’s almost 5 times more than the second-leading malware-hosting nation: the United Kingdom, who only came in at 10%. That’s quite a lead for the U.S.

So which brands are hosting malware, unintentionally? Amazon is reportedly responsible for 16%, while Go Daddy comes in at a close second with 14%. This data is especially interesting, when you think about how many articles cite Eastern Europe as the culprit. Don’t be fooled – the US is now producing more volumes of malware code than anyone else in the world.

Read more


Mobile hacking – the new trend in the mobile app hacking world

Mobile hackingThis blog sometimes runs the risk of become something of a Cassandra given the nature of the topics we cover. But we’d be failing in our duty if we didn’t bring things to your attention we think you should be aware of. As the old saying goes, ‘Forewarned is forearmed.’

And that said there’s rarely a dull moment in the online world with headline leading hacks happening on an almost weekly basis.  And the issues that have surfaced recently are very relevant to everyone who makes use of mobile computing.

Read more


What’s the Most Secure Web Browser?

World Wide WebWith over 10 popular web browsers out there, how are you supposed to know which will protect you and offer you with the services you need? Well, the good news is you don’t. There’s a lot to consider when looking for a good browser, and BullGuard is here to help you find the right one.

By looking at the browsers and checking for basic features like pop-up blocking, html5 support and private browsing, as well as features like flash, acid test scores and IPv6 support, it was easy to cull a few. And after delving into security and privacy features, only a few were left. But when it was all said and done, our vote is Firefox, without a doubt.

Read more


Rewards for Hackers

Rewards for HackersWe may have found a good purpose for Hackers. Before you go into shock, read on…

The company called Wickr, (for those of you that aren’t familiar with it, it’s a secure messaging app), has reached out to hackers and offered them a reward for doing what they do on a daily basis.

That’s right, hackers are being offered $100,000 to uncover and, here’s the important part, ‘responsibly disclose’ any and all critical security flaws in the company’s app.

Read more


Point-of-sale (PoS) Hacks

PoSJust before Christmas last year the mother of all hacks took place in the US. Target, a retailer which sells everything from kid’s swings and outdoor flooring to curling irons and razor sharp HD smart TVs had its point of sales (PoS) systems hacked.

Information from up to 40 million customer’s credit and debit cards was lifted by hackers. Within days, this information started appearing on underground web sites which specialize in this type of information. Some of the credit card details were going for about $20 each.  So worried were the banks that some of them even dived into the deep web and bought up the credit/debit card information to protect their reputation and their customer’s bank accounts.

Read more