Tips & advice


3182 articles

Cybercrime

The 6 biggest online gaming hacks

The 6 biggest online gaming hacks

Cybercrime

The 6 biggest online gaming hacks

We Live Security looks at six of the biggest online gaming hacks to date – From Xbox Live and PSN, to Big Fish Games and Steam.

Editor02 Jul 2015


Privacy

Eastern England councils in slew of data breach errors

Eastern England councils in slew of data breach errors

Privacy

Eastern England councils in slew of data breach errors

A series of more than 160 data breaches have struck local authorities in Norfolk, Suffolk and Cambridgeshire over the past year, according to new reports.

Karl Thomas01 Jul 2015


Cybercrime

US suspends background checks system after flaw found

US suspends background checks system after flaw found

Cybercrime

US suspends background checks system after flaw found

An entire US department program is to be suspended in order to fix vulnerabilities discovered during a security audit.

Karl Thomas30 Jun 2015


Cybercrime

Strengthening the different layers of IT networks

Strengthening the different layers of IT networks

Cybercrime

Strengthening the different layers of IT networks

Getting started on designing a network is a task of formidable proportions, but all the more so if you are looking to build a secure network.

Denise Giusto Bilić30 Jun 2015


Privacy

ICANN policy changes trigger privacy concerns

ICANN policy changes trigger privacy concerns

Privacy

ICANN policy changes trigger privacy concerns

Internet name authority ICANN has unsettled privacy advocates after a new working group document flagged changes to the way domain proxy services can operate.

Karl Thomas29 Jun 2015


Scams

Phone Scams: Increasing Numbers, Wider Scope

Phone Scams: Increasing Numbers, Wider Scope

Scams

Phone Scams: Increasing Numbers, Wider Scope

There's a lot more to phone scams than tech support, giving rise to an escalating number of complaints. Here's what two recent reports tell us.

David Harley26 Jun 2015


How To

4 tips for recovering from an attack

4 tips for recovering from an attack

How To

4 tips for recovering from an attack

Recent high-profile data breaches have illustrated criminals’ insatiable appetite for data and financial reward. Here's some information on what to do after an attack.

Editor25 Jun 2015


Privacy

New iPhone update blocks apps from seeing other apps you've installed

New iPhone update blocks apps from seeing other apps you've installed

Privacy

New iPhone update blocks apps from seeing other apps you've installed

Apple will reportedly introduce a new privacy update for the iPhone that will prevent installed iOS apps from seeing which other apps have been downloaded to the device.

Kyle Ellison25 Jun 2015


Privacy

How to steal PGP encryption keys (using radio waves and pita bread)

How to steal PGP encryption keys (using radio waves and pita bread)

Privacy

How to steal PGP encryption keys (using radio waves and pita bread)

An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a gadget so small it can be hidden inside some pita bread.

Graham Cluley23 Jun 2015