Phil Muncaster

Phil Muncaster

IT Journalist


Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.


152 articles by Phil Muncaster

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat

Phil Muncaster19 Jun 20245 min. read


Beyond the buzz: Understanding AI and its role in cybersecurity

Beyond the buzz: Understanding AI and its role in cybersecurity

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders

Phil Muncaster28 May 20245 min. read


Adding insult to injury: crypto recovery scams

Adding insult to injury: crypto recovery scams

Adding insult to injury: crypto recovery scams

Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over

Phil Muncaster02 May 20244 min. read


The many faces of impersonation fraud: Spot an imposter before it’s too late

The many faces of impersonation fraud: Spot an imposter before it’s too late

The many faces of impersonation fraud: Spot an imposter before it’s too late

What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be?

Phil Muncaster18 Apr 20245 min. read


Bitcoin scams, hacks and heists – and how to avoid them

Bitcoin scams, hacks and heists – and how to avoid them

Bitcoin scams, hacks and heists – and how to avoid them

Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safe

Phil Muncaster15 Apr 20246 min. read


Beyond fun and games: Exploring privacy risks in children’s apps

Beyond fun and games: Exploring privacy risks in children’s apps

Beyond fun and games: Exploring privacy risks in children’s apps

Should children’s apps come with ‘warning labels’? Here's how to make sure your children's digital playgrounds are safe places to play and learn.

Phil Muncaster11 Apr 20246 min. read


How often should you change your passwords?

How often should you change your passwords?

How often should you change your passwords?

And is that actually the right question to ask? Here’s what else you should consider when it comes to keeping your accounts safe.

Phil Muncaster03 Apr 20245 min. read


Borrower beware: Common loan scams and how to avoid them

Borrower beware: Common loan scams and how to avoid them

Borrower beware: Common loan scams and how to avoid them

Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.

Phil Muncaster26 Mar 20246 min. read


A prescription for privacy protection: Exercise caution when using a mobile health app

A prescription for privacy protection: Exercise caution when using a mobile health app

A prescription for privacy protection: Exercise caution when using a mobile health app

Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data

Phil Muncaster19 Mar 20245 min. read