Karl Thomas

Independent Correspondent



148 articles by Karl Thomas

Is online voting a security risk?

Is online voting a security risk?

Is online voting a security risk?

The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we opening ourselves up to vote rigging by power-hungry politicians or fame-seeking hackers?

Karl Thomas07 May 20153 min. read


Cybercrime

The world’s most wanted hackers

The world’s most wanted hackers

Cybercrime

The world’s most wanted hackers

The FBI is taking cybercrime seriously. Here are some of the most wanted hackers in the world, and what they're wanted for...

Karl Thomas04 May 20155 min. read


Cybercrime

5 signs you're in hackers’ sights

5 signs you're in hackers’ sights

Cybercrime

5 signs you're in hackers’ sights

“It won’t happen to me” is often uttered by citizens and businesses who are adamant that they won’t become a victim of cybercrime. But this confidence is often misplaced, with even the most basic security errors exploited by hackers.

Karl Thomas01 May 20154 min. read


Malware

Ransomware: Should you pay the cybercriminals?

Ransomware: Should you pay the cybercriminals?

Malware

Ransomware: Should you pay the cybercriminals?

If your files are encrypted by ransomware, should you pay the ransom? We examine the options...

Karl Thomas23 Apr 20153 min. read


Scams

Will people always ignore security warnings?

Will people always ignore security warnings?

Scams

Will people always ignore security warnings?

How much of people's willingness to ignore security warnings is down to their brains?

Karl Thomas17 Apr 20153 min. read


Mobile Security

How secure is your smartwatch?

How secure is your smartwatch?

Mobile Security

How secure is your smartwatch?

Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?

Karl Thomas15 Apr 20154 min. read


Digital Security

The hacker games that made beating security feel like a thrill

The hacker games that made beating security feel like a thrill

Digital Security

The hacker games that made beating security feel like a thrill

Real-world hacking has long since spawned legions of more glamorous portrayals in videogames. Here are five of the best that take hacking and elevate it to thrilling levels.

Karl Thomas06 Apr 20153 min. read


Digital Security

Five hacker movies that got things badly wrong

Five hacker movies that got things badly wrong

Digital Security

Five hacker movies that got things badly wrong

5 hacker movies that got computer security well off the mark.

Karl Thomas24 Mar 20153 min. read


Five alternatives to Bitcoin

Five alternatives to Bitcoin

Five alternatives to Bitcoin

Here’s a small selection of alternatives to Bitcoin - each of which has its own advantages. All of them share Bitcoin’s fundamental strengths, however - minimal or zero transfer fees, and freedom from traditional banking restrictions.

Karl Thomas05 Mar 20153 min. read