Tips & advice


3185 articles

How To

Five tips to help control your privacy on Mac OS X

Five tips to help control your privacy on Mac OS X

How To

Five tips to help control your privacy on Mac OS X

Apple’s Mac OS X Mavericks has some very neat privacy features built in - from a “Guest User” account which restricts people to using Safari when borrowing your Mac to a panel which prevents apps using your location.

Rob Waugh18 Mar 2014


How To

Tips for protecting against sextortion

Tips for protecting against sextortion

How To

Tips for protecting against sextortion

It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.

Lysa Myers17 Mar 2014


Malware, Scams

“You have cancer” phishing attack shows how low cybercriminals will go

“You have cancer” phishing attack shows how low cybercriminals will go

Malware, Scams

“You have cancer” phishing attack shows how low cybercriminals will go

A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization - but it's a malware-laced scam.

Rob Waugh17 Mar 2014


Malware

Microsoft Word users urged to apply urgent fix after targeted attacks

Microsoft Word users urged to apply urgent fix after targeted attacks

Malware

Microsoft Word users urged to apply urgent fix after targeted attacks

Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially crafted” Rich Text Format file allowed attackers to remotely execute code on the victim’s machine.

Rob Waugh15 Mar 2014


Privacy

Brainwave privacy standard “is needed” to prevent spying on EEG scan data, researchers warn

Brainwave privacy standard “is needed” to prevent spying on EEG scan data, researchers warn

Privacy

Brainwave privacy standard “is needed” to prevent spying on EEG scan data, researchers warn

Smartphone apps and home equipment for scanning brainwaves could lead to a future in which governments or companies misuse such data as a way of decoding people’s personality traits, researchers from MIT and the Technical University of Denmark have warned.

Rob Waugh14 Mar 2014


Malware, Cybercrime

Fake video of Malaysia Airlines flight MH370 rescue is ‘callous’ cyber scam

Fake video of Malaysia Airlines flight MH370 rescue is ‘callous’ cyber scam

Malware, Cybercrime

Fake video of Malaysia Airlines flight MH370 rescue is ‘callous’ cyber scam

A post promising a video of a plane landing on water has been circulating on Facebook, with a title suggesting that it contains news footage of the rescue of passengers on board the missing flight MH370 - but there is no video, and it's a criminal scam.

Rob Waugh14 Mar 2014


Scams

More Mystery Shopper Misery

More Mystery Shopper Misery

Scams

More Mystery Shopper Misery

'Highly-paid' mystery shopper assignments where you're sent cashier's checks upfront can end up costing you a lot of money.

David Harley13 Mar 2014


Malware, Cybercrime

Fridge attacks “raise big questions” says Microsoft security chief

Fridge attacks “raise big questions” says Microsoft security chief

Malware, Cybercrime

Fridge attacks “raise big questions” says Microsoft security chief

The emerging ‘internet of things’ raises big security questions, and vulnerabilities in connected devices such as ‘smart’ fridges may force companies to work together in a way never previously seen, according to Microsoft’s Jan Neutze.

Rob Waugh12 Mar 2014


Malware

Critical Internet Explorer zero-day vulnerability patched by Microsoft

Critical Internet Explorer zero-day vulnerability patched by Microsoft

Malware

Critical Internet Explorer zero-day vulnerability patched by Microsoft

Microsoft releases a fix for a zero-day vulnerability that has already been exploited by hackers in targeted attacks against some organisations. Don't delay!

Graham Cluley12 Mar 2014