Karl Thomas

Independent Correspondent



148 articles by Karl Thomas

Privacy

EU data protection regulation overhaul inches closer

EU data protection regulation overhaul inches closer

Privacy

EU data protection regulation overhaul inches closer

The 28 EU member states have taken a significant step towards a historic overhaul of EU-wide data protection laws, first proposed three years ago.

Karl Thomas16 Jun 20151 min. read


Password security firm LastPass compromised

Password security firm LastPass compromised

Password security firm LastPass compromised

Popular online password vault provider LastPass has warned users to update their master account passwords after their network was hacked.

Karl Thomas16 Jun 20151 min. read


Uber site flaw allows hacker to display rival ad

Uber site flaw allows hacker to display rival ad

Uber site flaw allows hacker to display rival ad

A flaw in taxi cab network Uber’s site allowed a security researcher to manipulate the firms home page and display a rival advert, it has been claimed.

Karl Thomas15 Jun 20151 min. read


Privacy

Wikipedia switches to HTTPS by default

Wikipedia switches to HTTPS by default

Privacy

Wikipedia switches to HTTPS by default

Wikimedia has announced that all of its web properties – including the enormously popular crowd-sourced dictionary Wikipedia – will now use HTTPS encryption by default.

Karl Thomas15 Jun 20151 min. read


Privacy

Snapchat bolsters security with optional Two-factor authentication

Snapchat bolsters security with optional Two-factor authentication

Privacy

Snapchat bolsters security with optional Two-factor authentication

Snapchat has added an option for two-factor authentication in its latest update, followed in the footsteps of Apple, Twitter and Facebook.

Karl Thomas12 Jun 20151 min. read


Cybercrime

5 hackers who came over from the dark side

5 hackers who came over from the dark side

Cybercrime

5 hackers who came over from the dark side

Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.

Karl Thomas25 May 20155 min. read


How To

5 security questions to ask before clicking on a link

5 security questions to ask before clicking on a link

How To

5 security questions to ask before clicking on a link

Should you trust that link? We Live Security runs down five quick security questions to ask before you click on a URL.

Karl Thomas22 May 20153 min. read


Privacy

What app permissions should I be wary of?

What app permissions should I be wary of?

Privacy

What app permissions should I be wary of?

Mobile applications increasingly want access to various functions on your smartphones and tablets, such as your location and contacts book. But some of these app permissions should not be granted.

Karl Thomas21 May 20154 min. read


Less Technical

5 signs that an app could be risky

5 signs that an app could be risky

Less Technical

5 signs that an app could be risky

Not all apps are worth your time and money. We Live Security looks at five signs the app you’re about to download could be risky, and worth investigating further.

Karl Thomas14 May 20154 min. read