Tips & advice


3128 articles

How to delete your smartphone data securely before selling your device

How to delete your smartphone data securely before selling your device

How to delete your smartphone data securely before selling your device

Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep information secure.

Denise Giusto Bilić03 Jun 2016


Crouching Tiger, Hidden DNS

Crouching Tiger, Hidden DNS

Crouching Tiger, Hidden DNS

An interesting DNS hijack that sets the victim's computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat.

Guest Author02 Jun 2016


Network ELOFANTS and other insider threat insights from the DBIR and beyond

Network ELOFANTS and other insider threat insights from the DBIR and beyond

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an "Employee Left Or Fired, Access Not Terminated" and these ghost account insiders can undermine your organization's information security, as recent DBIR stats suggest.

Stephen Cobb02 Jun 2016


Children’s Day advice: The risks looming in cyberspace

Children’s Day advice: The risks looming in cyberspace

Children’s Day advice: The risks looming in cyberspace

For many parents, especially those who aren't digital natives, recognizing risks that loom in cyberspace is not easy. This guide helps point to some of the main threats.

Ondrej Kubovič01 Jun 2016


65 million Tumblr users should probably be careful...

65 million Tumblr users should probably be careful...

65 million Tumblr users should probably be careful...

65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it's not just their passwords that they should be concerned about.

Graham Cluley30 May 2016


What the CISSP? 20 years as a Certified Information Systems Security Professional

What the CISSP? 20 years as a Certified Information Systems Security Professional

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

Stephen Cobb28 May 2016


Beware Burger King WhatsApp scam: It's a trap

Beware Burger King WhatsApp scam: It's a trap

Beware Burger King WhatsApp scam: It's a trap

Just when it seemed that the recent raft of WhatsApp scams were coming to a close, we have discovered a new one. This time it involves Burger King.

Lucas Paus26 May 2016


GDPR Day: countdown to a global privacy and security regimen?

GDPR Day: countdown to a global privacy and security regimen?

GDPR Day: countdown to a global privacy and security regimen?

This thing called GDPR will impact data security and privacy policy at many US firms when it takes effect two years from today. Start learning what the EU General Data Protection Regulation means to your business.

Stephen Cobb25 May 2016


Critical infrastructure: It's time to make security a priority

Critical infrastructure: It's time to make security a priority

Critical infrastructure: It's time to make security a priority

The importance of ensuring information security on critical infrastructure has been recognized for years, yet there are still cases that illustrate the need for improvement.

Camilo Gutiérrez Amaya24 May 2016