Securing the tunnels – all about VPNs

VPNVirtual private networks are a great way of securing your communications across the internet and even on internal networks. Businesses all over the world use them as standard. If you want rigorous network protection check out the tips below. You’ll learn all about VPNs, which ones are the most suitable for your needs and how to set up a VPN as well as really useful links.

Read more


8 most notorious hacking groups

AnonymousFrom attempts to take terror group ISIS off social media, to hacking into nuclear power plants, selling secrets to the KGB and accessing former UK prime minister Tony Blair’s private information, hackers have gained a lot of notoriety. They have made governments and global blue chips look like monkeys when it comes to IT security, and they continue to scoff at the ‘establishment.’ But are they really that bad or do some of them have a point? Below is a breakdown of some of the more infamous groups and their deeds; you can decide for yourself.

Read more


How hackers access your computer

hackThe internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.

Read more


Botnet network taken down, destructive critical infrastructure attacks up

safety internet hackerThere’s always something going on in the cyber world but the past week has been particularly noteworthy, ranging from businesses fighting back with a useful scam tracker to worrying findings suggesting that destructive attacks on critical infrastructure organisations are actually far more frequent than you would think.

Read more


How to recover lost data from USB flash drives and SD cards

USB stick informationsWith portable flash drives now as ubiquitous as fresh air we store all sorts of important information on them from important and sensitive documents to family and holiday snaps on digital SD cards. Never mind the heartache data loss that these devices can cause, it can also cause practical problems especially if these devices store the fruit of labours or sensitive information. However, the good news is that most of the time data can be recovered from flash drives and SD cards. And here’s how.

Read more


Hi-tech Movie Myths

hack.movieTraffic lights that are hacked, hotel doors prised open with ease and port security systems infiltrated to move millions of dollars of illicit goods are just some of the themes that crop up in the movies. These scenes were often set up in films years ago but today they’re not just fictional elements in a ripping good yarn, they are reality.

Read more


Tips to help identify and safeguard against hacks in the gaming world

computer gameGaming has gone from a niche activity back in the day, when only the devoted and fanatical applied themselves to games like Doom, to an explosive pastime enjoyed by over one billion people. Today’s games are clever, sophisticated and challenging. They’re also a target for hackers. If you’re a gaming fan, read on to discover how to protect yourself and how to identify potential attacks.

Read more


Ugly Mail – Gmail extension to identify e-mail tracking pixels

email With spyware and adware already tracking our movements across the web who needs another form of intrusive monitoring? It seems like some people can’t get enough of tracking others and emails that tell the senders whether you’ve opened an email and where you were if you did are becoming more common. However, help is at hand. Ugly Mail is the simplest of tools and it lets you know if an email that has dropped into your inbox is designed to track you.

Read more