Tips & advice


3128 articles

P F Chang’s chain suffers breach - thousands of cards for sale online

P F Chang’s chain suffers breach - thousands of cards for sale online

P F Chang’s chain suffers breach - thousands of cards for sale online

Newly stolen credit and debit card details, from cards used in P F Chang’s China Bistro, a nationwide American chain of restaurants, went on sale on an underground website this week at a site best-known for selling off the details of victims of the Target data breach.

Rob Waugh13 Jun 2014


How to spot fake Twitter accounts

How to spot fake Twitter accounts

How to spot fake Twitter accounts

Fake Twitter accounts may seem harmless, but a lot of them are filled with spam which may contain dangerous links. These simple steps from We Live Security will help you tell the difference between the real and phoney.

Editor13 Jun 2014


TweetDeck flaw uncovered “by accident”

TweetDeck flaw uncovered “by accident”

TweetDeck flaw uncovered “by accident”

A vulnerability in the official Twitter client Tweetdeck left users vulnerable to attack, forcing thousands of users to retweet cryptic lines of code to other users. Twitter repeatedly shut down the service, despite assurances the flaw had been ‘fixed’.

Rob Waugh12 Jun 2014


Bank of England “fends off” eight cyber attacks per week, says CISO

Bank of England “fends off” eight cyber attacks per week, says CISO

Bank of England “fends off” eight cyber attacks per week, says CISO

The Bank of England weathers an average of eight cyber attacks including malware-laced “spear phishing” campaigns per week, according to Chief Information Security Officer Don Randall.

Rob Waugh12 Jun 2014


World Cup scams: team tactics to keep you safe

World Cup scams: team tactics to keep you safe

World Cup scams: team tactics to keep you safe

With the World Cup in Brazil poised to begin, the whole world is watching - and that includes cybercriminals. Here's the latest on scam sites, phishing and how to enjoy surfing safely during the competition.

Gastón Charkiewicz11 Jun 2014


Banks to work with UK government experts to ‘predict’ cyber attacks

Banks to work with UK government experts to ‘predict’ cyber attacks

Banks to work with UK government experts to ‘predict’ cyber attacks

A new intelligence-sharing network aims to protect financial institutions by sharing information between government, security firms and financial institutions to “predict” vulnerabilities.

Rob Waugh10 Jun 2014


Facial recognition camera used to convict robber for first time

Facial recognition camera used to convict robber for first time

Facial recognition camera used to convict robber for first time

In a world-first case, biometric facial recognition software has been used to convict an armed robber, with a Chicago robber “matched” from CCTV footage to a mug shot, and sentenced to 22 years in prison.

Rob Waugh10 Jun 2014


Ransomware 101: FAQ for computer users and smartphone owners

Ransomware 101: FAQ for computer users and smartphone owners

Ransomware 101: FAQ for computer users and smartphone owners

Do you know what ransomware is? Do you know a filecoder from a lockscreen? Read our FAQ to become more clued-up about the ransomware threat, and ensure that your systems are properly protected.

Graham Cluley09 Jun 2014


Android malware: how to keep your device safe from filecoders (and everything else)

Android malware: how to keep your device safe from filecoders (and everything else)

Android malware: how to keep your device safe from filecoders (and everything else)

When ESET researchers analyzed the first Android ransomware controlled via Tor, it showed how quickly Android malware is evolving to match its PC cousins. Thankfully, sensible use of your device should help keep you safe.

Rob Waugh05 Jun 2014