Tips & advice


3185 articles

Cybercrime

Cyber Threat Intelligence Integration Center: will CTIIC be a game changer?

Cyber Threat Intelligence Integration Center: will CTIIC be a game changer?

Cybercrime

Cyber Threat Intelligence Integration Center: will CTIIC be a game changer?

Is America's new Cyber Threat Intelligence Integration Center a step forward? Or a duplication of the National Cybersecurity and Communications Integration Center at DHS?

Stephen Cobb11 Feb 2015


Privacy

Outlook app blocked by EU parliament over 'serious security issues'

Outlook app blocked by EU parliament over 'serious security issues'

Privacy

Outlook app blocked by EU parliament over 'serious security issues'

The Microsoft Outlook app has been banned from use in the EU Parliament, according to emails from the parliament's IT department, seen by PC World.

Alan Martin11 Feb 2015


Cybercrime

White House creates new agency to centralize cyberthreat intelligence

White House creates new agency to centralize cyberthreat intelligence

Cybercrime

White House creates new agency to centralize cyberthreat intelligence

The White House is creating a new agency to help counter cyberthreats, analyzing intelligence from around the government so it is better equipped to deal with attacks.

Kyle Ellison11 Feb 2015


Privacy

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

Privacy

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.

Kyle Ellison10 Feb 2015


Malware

Microsoft phishing email targeting corporate networks with 'neurotic malware'

Microsoft phishing email targeting corporate networks with 'neurotic malware'

Malware

Microsoft phishing email targeting corporate networks with 'neurotic malware'

Security researchers have uncovered a trojan that evades sandboxes specifically targeted at corporate users, hidden in legitimate looking phishing email that apes Microsoft's Volume License.

Alan Martin10 Feb 2015


Cybercrime

Watch how car hackers can disable brakes and steal your personal data

Watch how car hackers can disable brakes and steal your personal data

Cybercrime

Watch how car hackers can disable brakes and steal your personal data

Modern cars are more and more dependent on computer systems. And guess what? They can be hacked.

Graham Cluley10 Feb 2015


Scams

Anthem hack victims hit with phishing scams

Anthem hack victims hit with phishing scams

Scams

Anthem hack victims hit with phishing scams

Victims of the Anthem Inc health insurance hack are being bombarded with phishing scams including fraudulent emails and cold calls, reports Slashgear.

Kyle Ellison09 Feb 2015


Privacy

UK Government publishes its guidelines for 'equipment interference'

UK Government publishes its guidelines for 'equipment interference'

Privacy

UK Government publishes its guidelines for 'equipment interference'

The British government has released a document outlining the rules that British spy and law enforcement agencies have to follow in their hacking activities, reports The Guardian.

Alan Martin09 Feb 2015


How To

Common eBay scams and how to avoid them

Common eBay scams and how to avoid them

How To

Common eBay scams and how to avoid them

Buying and selling on eBay can be great, but it can also be fraught with risk. Here are some of the most common eBay scams and how they can be avoided.

Karl Thomas09 Feb 2015