Tips & advice


3182 articles

Cybercrime

Moonfruit takes customers' sites offline, as it prepares for DDoS attack

Moonfruit takes customers' sites offline, as it prepares for DDoS attack

Cybercrime

Moonfruit takes customers' sites offline, as it prepares for DDoS attack

A UK company which helps consumers and small businesses create websites and online stores has taken itself and its customers' sites offline, after receiving threats about an imminent internet attack.

Graham Cluley14 Dec 2015


Kids Online

Making devices secure this Christmas

Making devices secure this Christmas

Kids Online

Making devices secure this Christmas

Increasingly, on special occasions like birthdays and Christmas, parents are buying mobile and internet connected devices for their children. Our guide looks at how to make them safe before they are are unwrapped.

Narinder Purba14 Dec 2015


Digital Security

12 tree-mendous security tips for Christmas

12 tree-mendous security tips for Christmas

Digital Security

12 tree-mendous security tips for Christmas

Tis’ the season to be jolly but Christmas is also a happy time of year for cybercriminals looking for their own gifts. We look at what you can do to ensure it’s only Santa that is allowed to bypass your security.

Editor11 Dec 2015


Privacy

Microsoft issues warning after Xbox Live certificate 'inadvertently' leaks

Microsoft issues warning after Xbox Live certificate 'inadvertently' leaks

Privacy

Microsoft issues warning after Xbox Live certificate 'inadvertently' leaks

A malicious attacker could in theory use the leaked security certificate to launch a man-in-the-middle attack, intercepting Xbox Live usernames, passwords and even payments made by game players.

Graham Cluley11 Dec 2015


Scams

Tech support scams: 3 steps to conning unsuspecting victims

Tech support scams: 3 steps to conning unsuspecting victims

Scams

Tech support scams: 3 steps to conning unsuspecting victims

Tech support scams are “still big business”, ESET’s David Harley has previously said. In this guide we look at how fraudsters dupe their victims into handing over cash, while also corrupting their devices.

Editor10 Dec 2015


Digital Security

Cyber experts ‘in hot demand’

Cyber experts ‘in hot demand’

Digital Security

Cyber experts ‘in hot demand’

The demand for cyber experts is at a record high, with more firms eager to secure the services of experts to ensure they are safe from attacks. And they’re willing to pay top dollar.

Narinder Purba10 Dec 2015


Digital Security

Safe, secure online shopping at home and on the go

Safe, secure online shopping at home and on the go

Digital Security

Safe, secure online shopping at home and on the go

At home, on the move, on a computer or via a mobile, online shopping habits have changed massively as technology as become more powerful. With Christmas around the corner, we look at some of the key details.

Editor09 Dec 2015


Internet of Things

Wearables: where's the security risk?

Wearables: where's the security risk?

Internet of Things

Wearables: where's the security risk?

Stephen Cobb08 Dec 2015


Cybercrime

Hackers announce WWE's Jim Ross is dead, after wrestling control of his Twitter account

Hackers announce WWE's Jim Ross is dead, after wrestling control of his Twitter account

Cybercrime

Hackers announce WWE's Jim Ross is dead, after wrestling control of his Twitter account

Leeds United-loving football fans appear to have hacked the Twitter account of WWE legend Jim Ross, and announced his death.

Graham Cluley07 Dec 2015