Tips & advice


3182 articles

Privacy

How to stop pervy pics popping up on your iPhone

How to stop pervy pics popping up on your iPhone

Privacy

How to stop pervy pics popping up on your iPhone

Don't be cyber-flashed by a pervert. Make sure that your iOS device's AirDrop settings are configured properly to protect your eyes from unpleasantness.

Graham Cluley13 Aug 2015


Digital Security

5 child geniuses destined for a career in cybersecurity

5 child geniuses destined for a career in cybersecurity

Digital Security

5 child geniuses destined for a career in cybersecurity

There is a huge shortage of skilled professionals in cybersecurity. We take a look at five young geniuses who may be the future of the industry.

Karl Thomas11 Aug 2015


Privacy

Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft's new OS

Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft's new OS

Privacy

Windows 10, Privacy 0? ESET deep dives into the privacy of Microsoft's new OS

Windows 10 offers more personalisation and integration than ever before. We take a look at the privacy implications of this.

Aryeh Goretsky06 Aug 2015


Privacy

Hacker sends woman pictures of herself from her own webcam

Hacker sends woman pictures of herself from her own webcam

Privacy

Hacker sends woman pictures of herself from her own webcam

Hacker sends woman images of herself and her boyfriend, which were captured through their own webcam.

Karl Thomas04 Aug 2015


Cybercrime

Indiana's AG launches investigation into major data breach

Indiana's AG launches investigation into major data breach

Cybercrime

Indiana's AG launches investigation into major data breach

Indiana's Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.

Karl Thomas03 Aug 2015


Cybercrime

Hacking Team and other breaches as security lessons learned

Hacking Team and other breaches as security lessons learned

Cybercrime

Hacking Team and other breaches as security lessons learned

Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.

Stephen Cobb01 Aug 2015


How To

5 Systems Admin relationship tips (so you’re on talking terms again)

5 Systems Admin relationship tips (so you’re on talking terms again)

How To

5 Systems Admin relationship tips (so you’re on talking terms again)

Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.

Cameron Camp31 Jul 2015


Cybercrime

United Airlines customer flight records breached

United Airlines customer flight records breached

Cybercrime

United Airlines customer flight records breached

United Airlines customer flight records have been lost in a data breach it has been reported.

Karl Thomas30 Jul 2015


Privacy

‘Keystroke Biometrics’ exploit defeats Tor privacy

‘Keystroke Biometrics’ exploit defeats Tor privacy

Privacy

‘Keystroke Biometrics’ exploit defeats Tor privacy

Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor.

Karl Thomas29 Jul 2015