How to


172 articles

How To

Encryption advice for companies in the wake of Snowden NSA revelations

Encryption advice for companies in the wake of Snowden NSA revelations

How To

Encryption advice for companies in the wake of Snowden NSA revelations

What are the immediate practical implications of the Snowden-prompted revelation that the NSA has broken or circumvented a lot of commercially available encryption? For a start, you should not stop using encryption, but you may want to review how you use it moving forward, Stephen Cobb explains.

Stephen Cobb11 Sep 2013


How To

Comment/No Comment: a word about blog comments

Comment/No Comment: a word about blog comments

How To

Comment/No Comment: a word about blog comments

David Harley10 Sep 2013


How To

In a rush? Five two-minute tips to make yourself more secure right now

In a rush? Five two-minute tips to make yourself more secure right now

How To

In a rush? Five two-minute tips to make yourself more secure right now

Performing a “cyber spring clean” can be time-consuming - but many of us have a few weaknesses we can tighten up in two minutes or less. Here are a few "instant fixes" for problems you might have overlooked...

Rob Waugh04 Sep 2013


How To

Big phish, small pond: How to stay safe from SMS phishing scams

Big phish, small pond: How to stay safe from SMS phishing scams

How To

Big phish, small pond: How to stay safe from SMS phishing scams

Phishing emails are a sad fact of life, and most of us are used to dealing with them - but cybercriminals are increasingly turning to SMS to reel in their victims. Our tips should help you avoid clicking something you'll regret.

Rob Waugh30 Aug 2013


How To

Justin Bieber's AMAZING diet: Five social posts you should never click

Justin Bieber's AMAZING diet: Five social posts you should never click

How To

Justin Bieber's AMAZING diet: Five social posts you should never click

Most of us have faced cyber attacks sent by our best friends - Facebook "offers" they've clicked by accident, spamming everyone on their friends list, or Twitter stories they've shared without checking.

Rob Waugh15 Aug 2013


How To

Don't get zombified! Security tips for PC gamers

Don't get zombified! Security tips for PC gamers

How To

Don't get zombified! Security tips for PC gamers

Don't let your PC end up in someone's zombie army. Gamers are prime targets for cybercriminals - our tips should help you avoid ending up an infected victim...

Rob Waugh12 Aug 2013


How To

Bulletproof Inbox: Tips for staying safe (and sane) on email

Bulletproof Inbox: Tips for staying safe (and sane) on email

How To

Bulletproof Inbox: Tips for staying safe (and sane) on email

Many of us have got wiser to email spams and scams - but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the "click of death"...

Rob Waugh02 Aug 2013


How To

Safe Summer PC Usage - beat the heat and stay secure with your laptop, tablet or smartphone

Safe Summer PC Usage - beat the heat and stay secure with your laptop, tablet or smartphone

How To

Safe Summer PC Usage - beat the heat and stay secure with your laptop, tablet or smartphone

Beat the heat, find somewhere cool to compute! But first check our tips on how to more safely navigate the mall, lobby, library, coffee shop or wherever you go to chill out with your digital devices.

Aryeh Goretsky29 Jul 2013


How To

Avoid “droid rage”: Five tips to keep your Android secure

Avoid “droid rage”: Five tips to keep your Android secure

How To

Avoid “droid rage”: Five tips to keep your Android secure

Many people leave phones and tablets “open” to criminals - both the cyber variety, and the ordinary, non-cyber kind. Our tips should help your handset safe.

Rob Waugh26 Jul 2013